Ultime news
Meta and Google suspend construction of two undersea cables due to instability in the Red Sea
Let the hunt begin! Critical 7-Zip bug puts millions of users at risk.
Python to Rust: A More Secure Future for the Programming Language
Multi-threaded Hacking: US Pioneers Automated Operations with AI Agents
WhatsApp data leak: 3.5 billion numbers “stolen” by researchers at the University of Vienna
Google launches Gemini 3, its most advanced artificial intelligence model
Drones at Brussels Airport and Military Bases: Security at Risk
Redazione RHC - November 4th, 2025
Does Microsoft use macOS to create Windows wallpapers? Probably!
Redazione RHC - November 4th, 2025
Louvre Theft: Windows 2000 and Windows XP on Networks, as Well as Simple Passwords
Redazione RHC - November 4th, 2025
SesameOp: The Malware That Uses OpenAI Assistants for Command and Control
Redazione RHC - November 4th, 2025
Chinese hackers target European diplomatic agencies (including Italy)
Redazione RHC - November 4th, 2025
Eight 0-days worth $35 million sold to Russia by US insiders
Redazione RHC - November 4th, 2025
Trump refuses to export Nvidia chips. China responds: “Don’t worry, we’ll do it ourselves.”
Redazione RHC - November 4th, 2025
Goodbye, malware! In 2025, criminal hackers will use legitimate accounts to remain invisible.
Redazione RHC - November 4th, 2025
Cyberstalking Against Women: Analysis and Legal Implications
Paolo Galdieri - November 4th, 2025
WSUS security update has broken hotpatches on Windows Server 2025
Redazione RHC - November 3rd, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeAn ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…
CybercrimeThere’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…
CybercrimeWhen it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…
CybercrimeAccording to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…
VulnerabilityThe following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…











