Ultime news
Europe’s Digital Sovereignty: The Risks of Relying on Non-European Tech
Apple’s Major Shake-Up: Johny Srouji Leaves as Senior VP of Hardware Technologies
Cloudflare Outage: 25 Minutes of Chaos Due to React Server Issue
Microsoft CEO on AI Challenges
Pat Gelsinger on Quantum Computing Impact on AI Future
AI-Generated Scams: New Threats with Deepfake Photos and Videos
Kraken Arrives: The New Ransomware That Assesses Your Environment to Inflict Maximum Damage
Redazione RHC - November 15th, 2025
North Korea reorganizes its intelligence with a new agency
Redazione RHC - November 15th, 2025
Cognitive Biases and Cybersecurity: The Fatal Fallacy of “I Have Nothing to Hide”
Fabrizio Saviano - November 15th, 2025
Did they give you a digital photo frame? It’s more than just family memories.
Redazione RHC - November 15th, 2025
What are PsyOps? Exploring mind manipulation in the digital age.
Redazione RHC - November 15th, 2025
Understanding Firewalls: The First Line of Defense in Cybersecurity
Redazione RHC - November 15th, 2025
Critical Vulnerability in FortiWeb: Fortinet and CISA Recommend Urgent Updates
Redazione RHC - November 15th, 2025
China’s New Era of Robots: Shenzhen at the Center of the Technological Revolution
Redazione RHC - November 15th, 2025
IndonesianFoods: The Worm That’s Wreaking Havoc on npm and Created 100,000 Packages
Redazione RHC - November 15th, 2025
Vibe-Hacking: The New Frontier of Criminal Cybersecurity
Andrea Fellegara - November 15th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeAttackers are exploiting a previously patched critical FortiGate authentication flaw (CVE-2025-59718) through a patch bypass method to breach protected firewalls, as Fortinet customers are experiencing. Fortinet reportedly plans to soon release FortiOS versions 7.4.11, 7.6.6,…
CybercrimeA critical zero-day remote code execution (RCE) vulnerability, identified as CVE-2026-20045, has been discovered by Cisco and is being actively exploited in active attacks. Cisco has urged immediate patching, and its Product Security Incident Response…
innovationIn the Italian and European cybersecurity landscape, few collaborations manage to combine educational vision, technical realism, and community impact as effectively as the partnership announced between Red Hot Cyber and Hack The Box (HTB) for…
CybercrimeYesterday, the Everest cybercriminal gang claimed responsibility for a cyberattack on McDonald’s on their Data Leak Site (DLS) . From the gang’s post, the cybercriminals claim to have 861GB of data exfiltrated from the company’s…
CybercrimeA group of attackers is using a zero-day exploit toolkit to compromise VMware ESXi instances in an uncontrolled manner, taking advantage of multiple vulnerabilities to bypass virtual machine restrictions. The current incident highlights the ongoing…











