Ultime news
Let the hunt begin! Critical 7-Zip bug puts millions of users at risk.
Python to Rust: A More Secure Future for the Programming Language
Multi-threaded Hacking: US Pioneers Automated Operations with AI Agents
WhatsApp data leak: 3.5 billion numbers “stolen” by researchers at the University of Vienna
Google launches Gemini 3, its most advanced artificial intelligence model
CISA’s ‘Secure by Design’ Pledge: A Year of Progress in Cybersecurity
Eight 0-days worth $35 million sold to Russia by US insiders
Redazione RHC - November 4th, 2025
Trump refuses to export Nvidia chips. China responds: “Don’t worry, we’ll do it ourselves.”
Redazione RHC - November 4th, 2025
Goodbye, malware! In 2025, criminal hackers will use legitimate accounts to remain invisible.
Redazione RHC - November 4th, 2025
Cyberstalking Against Women: Analysis and Legal Implications
Paolo Galdieri - November 4th, 2025
WSUS security update has broken hotpatches on Windows Server 2025
Redazione RHC - November 3rd, 2025
Hanyuan-1: China’s room-temperature quantum computer challenges the US
Redazione RHC - November 3rd, 2025
Inside NVIDIA: Jensen Huang leads 36 managers, 36,000 employees, and reads 20,000 emails a day
Redazione RHC - November 3rd, 2025
Userbox shut down and its admin arrested by Moscow police. Something is changing.
Redazione RHC - November 3rd, 2025
Will Bug Hunters Be Out of Work? OpenAI Introduces Aardvark, Its New Bug Fixer
Redazione RHC - November 3rd, 2025
The Louvre Theft: How Password Governance Can Undermine Security
Redazione RHC - November 3rd, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeStraiker’s AI Research (STAR) team has identified Villager, a native AI-based penetration testing framework developed by the Chinese group Cyberspike . The tool, presented as a red team solution , is designed to fully automate…
CybercrimeAn ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…
CybercrimeThere’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…
CybercrimeWhen it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…
CybercrimeAccording to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…











