Welcome to Red Hot Cyber | Cybersecurity News
Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320x100 Itcentric
TM RedHotCyber 970x120 042543

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Amnesty International Launches .onion Site for Secure Access to Human Rights Info

Amnesty International has launched its own website, accessible via the .onion domain on the Tor network, offering a new secure...
Redazione RHC - 12 December 2025

NANOREMOTE Trojan Uses Google Drive for Command and Control

A new multifunctional Windows Trojan called NANOREMOTE uses a cloud file storage service as its command center , making the...
Redazione RHC - 12 December 2025

Microsoft Azure OAuth Attack: ConsentFix Malware Steals Accounts

A new scheme called " ConsentFix " expands the capabilities of the already known ClickFix social media attack and allows...
Redazione RHC - 12 December 2025

Linux Foundation Launches Agentic AI Foundation with Key Tech Players

The establishment of the Agentic AI Foundation (AAIF), a dedicated fund under the auspices of the Linux Foundation , was...
Redazione RHC - 12 December 2025

Disney Invests $1 Billion in OpenAI for Sora Video Deal

Disney will invest $1 billion in OpenAI and officially license its characters for use in its Sora video generator. The...
Redazione RHC - 12 December 2025

Microsoft 365 Okta Phishing Attack: Experts Warn of New Threat

A recent study by Datadog Security Labs reveals an ongoing operation targeting organizations using Microsoft 365 and Okta for single...
Redazione RHC - 12 December 2025

Intellexa Exploits Zero-Day Vulnerabilities with Spyware

Despite significant geopolitical challenges, the mercenary spyware industry remains a resilient and persistent threat; in this context, the well-known vendor Intellexa continues to expand its arsenal. A recent report from...
Share on Facebook Share on LinkedIn Share on X

Malaysia Cracks Down on Bitcoin Mining Thefts

Thieves usually target tangible assets: cash or non-cash, jewelry, cars. But with cryptocurrencies, things are much stranger. Malaysian police are hunting down around 14,000 illegal Bitcoin mining companies that have...
Share on Facebook Share on LinkedIn Share on X

Australia Bans Social Media for Under 16s: What You Need to Know

Australia is soon to introduce groundbreaking legislation banning social media access for children under 16, an initiative that will set a precedent worldwide. A similar measure will soon be adopted...
Share on Facebook Share on LinkedIn Share on X

Palo Alto Networks VPN Vulnerability Exploited by Hackers

An increasingly aggressive campaign, directly targeting remote access infrastructure, has prompted threat actors to actively attempt to exploit vulnerabilities in Palo Alto Networks' GlobalProtect VPN portals . On December 5,...
Share on Facebook Share on LinkedIn Share on X

US Brothers Accused of Destroying 96 Databases with AI

The U.S. Department of Justice has accused twin brothers Muneeb and Sohaib Akhter of deleting 96 databases containing sensitive information, including investigative records and documents requested under the Freedom of...
Share on Facebook Share on LinkedIn Share on X

US Seizes Phishing Site Used by Myanmar Scammers to Steal Millions

The U.S. Department of Justice has announced the shutdown of a phishing website used by scammers in Myanmar to steal thousands of dollars from victims. According to the department, the...
Share on Facebook Share on LinkedIn Share on X

Digital Literacy in Schools: The Key to Unlocking Students’ Potential

According to Eurostat, in 2023 only 55% of European Union citizens aged 16 to 74 had at least basic digital skills, with strong differences between countries: values ​​ranging from around...
Share on Facebook Share on LinkedIn Share on X

OSINT Investigation: Uncovering Digital Evidence

We live in an age of almost mandatory transparency, an age in which every single digital action we take, be it a simple tap on a screen, an online search,...
Share on Facebook Share on LinkedIn Share on X

Europe’s Digital Sovereignty: The Risks of Relying on Non-European Tech

In recent months, two seemingly unrelated events have highlighted an uncomfortable truth: Europe no longer controls its own digital infrastructure . And this dependence, in an increasingly tense geopolitical landscape,...
Share on Facebook Share on LinkedIn Share on X

Apple’s Major Shake-Up: Johny Srouji Leaves as Senior VP of Hardware Technologies

Apple is going through a period of major leadership changes , with the departure of key figures who have contributed significantly to the company's technological development. The latest executive to...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sito
TikTok Accused of Illegally Tracking Users’ Data Across Apps
Redazione RHC - 21/12/2025

The popular video app TikTok has found itself at the center of a new scandal over violations of European data protection regulations. The service has been found to track users’ activity not only within its…

Immagine del sito
Naftali Bennett Telegram Account Hacked in Israel Politics
Redazione RHC - 21/12/2025

Former Israeli Prime Minister Naftali Bennett has admitted that his Telegram account was hacked, although his device was not compromised. He made the announcement following reports of a hacked iPhone and a data leak allegedly…

Immagine del sito
Cisco Secure Email Gateway Vulnerability Exploited: Act Now
Redazione RHC - 21/12/2025

A critical zero-day flaw in Cisco Secure Email Gateway and Cisco Secure Email and Web Manager devices is causing concern among security researchers. With over 120 vulnerable devices already identified and actively exploited by attackers,…

Immagine del sito
Airbus Eyes Sovereign Cloud to Mitigate US Data Risks
Redazione RHC - 21/12/2025

In recent months, a question has been emerging with increasing insistence on European corporate boards: is the US cloud really safe for all companies? Especially for those operating in strategic sectors or with economic, industrial,…

Immagine del sito
North Korean Hackers Steal $2 Billion in Crypto, Targeting DeFi Sector
Redazione RHC - 21/12/2025

In 2025, North Korean hackers stole a record $2 billion in cryptocurrency , 51% more than the previous year. However, the number of attacks has decreased, while the damage has increased. According to Chainalysis, North…