Ultime news
Airbus A320 Recall Due to ELAC System Failure Caused by Solar Flares
OpenAI Faces Fierce Competition from Google’s Gemini 3
Leonardo’s Michelangelo Dome: AI-Powered Defense Against Hypersonic Threats
Windows 11 Password Issue: Microsoft Warns of Invisible Icon Bug
CISA Warns of OpenPLC ScadaBR Vulnerability Exploitation
The Power of A* Algorithm in Artificial Intelligence and Robotics
Kraken Arrives: The New Ransomware That Assesses Your Environment to Inflict Maximum Damage
Redazione RHC - November 15th, 2025
North Korea reorganizes its intelligence with a new agency
Redazione RHC - November 15th, 2025
Cognitive Biases and Cybersecurity: The Fatal Fallacy of “I Have Nothing to Hide”
Fabrizio Saviano - November 15th, 2025
Did they give you a digital photo frame? It’s more than just family memories.
Redazione RHC - November 15th, 2025
What are PsyOps? Exploring mind manipulation in the digital age.
Redazione RHC - November 15th, 2025
Understanding Firewalls: The First Line of Defense in Cybersecurity
Redazione RHC - November 15th, 2025
Critical Vulnerability in FortiWeb: Fortinet and CISA Recommend Urgent Updates
Redazione RHC - November 15th, 2025
China’s New Era of Robots: Shenzhen at the Center of the Technological Revolution
Redazione RHC - November 15th, 2025
IndonesianFoods: The Worm That’s Wreaking Havoc on npm and Created 100,000 Packages
Redazione RHC - November 15th, 2025
Vibe-Hacking: The New Frontier of Criminal Cybersecurity
Andrea Fellegara - November 15th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers use wipers, destructive tools that…











