Ultime news
Microsoft Expands Global Network with New Undersea Fiber Optic Cables
Poisoning AI Data: The New Threat to Machine Learning Models
Pig Butchering Scams Evolve with PBaaS: The New Threat
Apache Struts 2 Vulnerability CVE-2025-68493 Exposes Sensitive Data
CRISPR-Cas13: Breakthrough in Flu Treatment with Gene Editing
Uncovering Dark AI: The Truth Behind Crime-as-a-Service Chatbots
Malware PHALT#BLYX Uses Social Engineering and MSBuild to Infect Systems
Redazione RHC - January 7th, 2026
Disable Windows 11 AI Features Easily with RemoveWindowsAI Tool
Redazione RHC - January 7th, 2026
DevSecOps: Integrating Security into Your Development Process
Massimiliano Brolli - January 7th, 2026
Critical RCE Vulnerability in D-Link DSL Routers – Update Now
Redazione RHC - January 7th, 2026
Critical n8n Vulnerability: Update Now to Prevent RCE Attacks
Redazione RHC - January 7th, 2026
Ledger Data Breach: Global-e Hack Exposes Customer Info
Redazione RHC - January 7th, 2026
LED Data Transmission System for Smart Traffic
Redazione RHC - January 7th, 2026
Microsoft Shifts to Rust: AI-Driven Code Transformation by 2030
Redazione RHC - January 7th, 2026
Microsoft’s AI Future: Models to Systems with Satya Nadella
Redazione RHC - January 6th, 2026
Rare Earth Elements: US-China Competition Heats Up
Redazione RHC - January 6th, 2026
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
innovationIn the Italian and European cybersecurity landscape, few collaborations manage to combine educational vision, technical realism, and community impact as effectively as the partnership announced between Red Hot Cyber and Hack The Box (HTB) for…
CybercrimeYesterday, the Everest cybercriminal gang claimed responsibility for a cyberattack on McDonald’s on their Data Leak Site (DLS) . From the gang’s post, the cybercriminals claim to have 861GB of data exfiltrated from the company’s…
CybercrimeA group of attackers is using a zero-day exploit toolkit to compromise VMware ESXi instances in an uncontrolled manner, taking advantage of multiple vulnerabilities to bypass virtual machine restrictions. The current incident highlights the ongoing…
CybercrimeResearchers from the Cybersecurity and Industrial Cryptography team at KU Leuven have discovered a critical flaw in the Google Fast Pair protocol. The vulnerability allows attackers to hijack control of millions of Bluetooth devices, track…
CybercrimeElon Musk has filed a staggering $134 billion in damages in a malicious lawsuit against OpenAI and Microsoft. According to Bloomberg , the latest lawsuit accuses OpenAI of betraying its core mission as a nonprofit…











