Ultime news
Apache SkyWalking Vulnerability Exposes Users to XSS Attacks
Bloody Wolf Attacks Central Asia with NetSupport RAT via Java Exploits
WhatsApp Blocked in Russia: Messaging App Faces Crackdown
CEO Scam: How to Protect Your Company from Business Email Compromise
Shai-Hulud Worm Spreads Beyond npm, Attacks Maven
11.7% of jobs could be replaced by artificial intelligence
Emotet: The horse returns to a gallop more dangerous than ever
Redazione RHC - November 13th, 2025
Two 0-day attacks, one attack: the perfect strike against Citrix and Cisco. Amazon’s discovery
Redazione RHC - November 13th, 2025
The Queen of Cryptocurrency Has Been Captured! She Stole $7 Billion in Bitcoin
Redazione RHC - November 13th, 2025
Cyber Sabotage Alert: Volt Typhoon Prepares for Destructive Activities
Redazione RHC - November 13th, 2025
Microsoft fixes 63 vulnerabilities, including an actively exploited zero-day
Redazione RHC - November 13th, 2025
Italy and Adult Sites: The Country Where Entry Is Forbidden… But If You Click Yes, It’s Okay
Redazione RHC - November 13th, 2025
Top Malware: Flame, the modular “spy” malware targeting the Middle East.
Massimiliano Brolli - November 12th, 2025
Slammer, the first worm to use a bug that hasn’t been fixed for six months.
Redazione RHC - November 12th, 2025
The Story of the First Keylogger: How Hidden Keyboard Control Came to Be
Redazione RHC - November 12th, 2025
A Brief History of Malware: The Evolution of the Species from Its Origins to the Present Day
Redazione RHC - November 12th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeAn ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…
CybercrimeThere’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…
CybercrimeWhen it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…
CybercrimeAccording to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…
VulnerabilityThe following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…











