Ultime news
WhatsApp: all it takes is a phone number to know when you sleep, go out, or come home
Cyber Geopolitics: How Tech Becomes a Global Battleground
SOAP Vulnerability in .NET Framework Allows Remote Code Execution
CVE-2025-55182 React Server Components Vulnerability Exploited
Top 25 Software Vulnerabilities 2025: MITRE CWE Ranking and Security Tips
The Future of Work: 4-Day Week with AI and Tech Advances
ENISA takes on the role of Root in the European Cybersecurity Initiative (CVE).
Redazione RHC - November 27th, 2025
Supply Chain Attack on OpenAI: Analytics Provider Mixpanel Compromised
Redazione RHC - November 27th, 2025
Be careful when using SSDs! Without power, you risk data loss
Redazione RHC - November 27th, 2025
Quantum Computing vs. Artificial Intelligence: Which Will Really Change the Future?
Redazione RHC - November 27th, 2025
ToddyCat APT Group Targets Microsoft 365 Email Security
Redazione RHC - November 27th, 2025
Tor Boosts Security with Counter Galois Onion CGO Encryption
Redazione RHC - November 27th, 2025
WormGPT 4: AI-Powered Cybercrime Tools on the Rise
Redazione RHC - November 26th, 2025
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Redazione RHC - November 26th, 2025
Investment Scam Alert: How to Avoid Losing Thousands
Redazione RHC - November 26th, 2025
Trump Launches Genesis AI Mission to Revolutionize US Science
Redazione RHC - November 26th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
innovationIn the Italian and European cybersecurity landscape, few collaborations manage to combine educational vision, technical realism, and community impact as effectively as the partnership announced between Red Hot Cyber and Hack The Box (HTB) for…
CybercrimeYesterday, the Everest cybercriminal gang claimed responsibility for a cyberattack on McDonald’s on their Data Leak Site (DLS) . From the gang’s post, the cybercriminals claim to have 861GB of data exfiltrated from the company’s…
CybercrimeA group of attackers is using a zero-day exploit toolkit to compromise VMware ESXi instances in an uncontrolled manner, taking advantage of multiple vulnerabilities to bypass virtual machine restrictions. The current incident highlights the ongoing…
CybercrimeResearchers from the Cybersecurity and Industrial Cryptography team at KU Leuven have discovered a critical flaw in the Google Fast Pair protocol. The vulnerability allows attackers to hijack control of millions of Bluetooth devices, track…
CybercrimeElon Musk has filed a staggering $134 billion in damages in a malicious lawsuit against OpenAI and Microsoft. According to Bloomberg , the latest lawsuit accuses OpenAI of betraying its core mission as a nonprofit…











