Ultime news
Shai-Hulud Worm Spreads Beyond npm, Attacks Maven
11.7% of jobs could be replaced by artificial intelligence
The market for “controlling” people is taking off on the Dark Web.
God is in the Cloud: They Hacked Your Brain and You Liked It
Does Windows Suck? A Video by Dave Plummer, the Microsoft Engineer Who Created Task Manager
China surpasses US in open-source AI models
Microsoft fixes 63 vulnerabilities, including an actively exploited zero-day
Redazione RHC - November 13th, 2025
Italy and Adult Sites: The Country Where Entry Is Forbidden… But If You Click Yes, It’s Okay
Redazione RHC - November 13th, 2025
Top Malware: Flame, the modular “spy” malware targeting the Middle East.
Massimiliano Brolli - November 12th, 2025
Slammer, the first worm to use a bug that hasn’t been fixed for six months.
Redazione RHC - November 12th, 2025
The Story of the First Keylogger: How Hidden Keyboard Control Came to Be
Redazione RHC - November 12th, 2025
A Brief History of Malware: The Evolution of the Species from Its Origins to the Present Day
Redazione RHC - November 12th, 2025
What Are Large Language Models? Behind the Scenes of Artificial Intelligence
Marcello Politi - November 12th, 2025
Let’s discover the differences between a Machine Learning and Deep Learning algorithm
Marcello Politi - November 12th, 2025
Hallucination in Artificial Intelligence: Between Strange and Disturbing Errors
Simone Raponi - November 12th, 2025
How do machines learn? Let’s explore supervised, unsupervised, and reward learning approaches.
Francesco Conti - November 12th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeAn ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…
CybercrimeThere’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…
CybercrimeWhen it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…
CybercrimeAccording to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…
VulnerabilityThe following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…











