Ultime news
Critical React Server Vulnerability: Update Now to Prevent RCE Attacks
Critical Vulnerability in King Addons for Elementor Exploited
Google Discover AI Headlines: Revolutionizing News Feed or Clickbait Nightmare?
Storm-0900 Phishing Campaign Spreads XWorm Malware
Windows 10 Still Running on 1 Billion PCs, Upgrade to Windows 11 Urged
Secure AI Integration in OT Systems: Key Principles and Best Practices
MONOLOCK: The new “silent” ransomware group that rejects leak sites and affiliate panels.
Luca Stivali - November 21st, 2025
Critical vulnerability in the WordPress plugin W3 Total Cache. 430,000 sites at risk!
Redazione RHC - November 21st, 2025
Hundreds of robots on the march: China presents the new generation of humanoids
Redazione RHC - November 21st, 2025
Veeam launches Data Platform v13, redefining the standard for cyber resilience and advanced data protection.
Redazione RHC - November 20th, 2025
Happy birthday, Windows! 40 years of operating system history and still going strong.
Redazione RHC - November 20th, 2025
World Children’s Day: Children live in digital, but digital wasn’t designed for them.
Simone D'Agostino - November 20th, 2025
Huawei unveils HarmonyOS and the new HM740 laptop. Is Microsoft Office at risk?
Redazione RHC - November 20th, 2025
Meta and Google suspend construction of two undersea cables due to instability in the Red Sea
Redazione RHC - November 20th, 2025
Let the hunt begin! Critical 7-Zip bug puts millions of users at risk.
Redazione RHC - November 20th, 2025
Python to Rust: A More Secure Future for the Programming Language
Redazione RHC - November 19th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeThere’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…
CybercrimeWhen it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…
CybercrimeAccording to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…
VulnerabilityThe following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…
CybercrimeA critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…











