Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Mobile
970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

The Birth of World Wide Web: How Tim Berners-Lee Created the First Website Culture

The Birth of World Wide Web: How Tim Berners-Lee Created the First Website

There you have it! On December 20, 1990, something epochal happened at CERN in Geneva. Tim Berners-Lee , a British...
Redazione RHC - 20 December 2025
WatchGuard Firewall Zero-Day Vulnerability CVE-2025-14733 Exploited Cybercrime

WatchGuard Firewall Zero-Day Vulnerability CVE-2025-14733 Exploited

A critical zero-day vulnerability, identified as CVE-2025-14733, has left network administrators on their knees, forcing them into a race against...
Redazione RHC - 19 December 2025
Linux Kernel CVE-2025-68260 Vulnerability Fixed: Rust Code at Risk Vulnerability

Linux Kernel CVE-2025-68260 Vulnerability Fixed: Rust Code at Risk

The world of technology is a veritable battlefield, where coding geniuses challenge malicious attackers every day with exploits and security...
Redazione RHC - 19 December 2025
Google and Apple Embrace Interoperability with Android iOS Data Transfer Cybercrime

Google and Apple Embrace Interoperability with Android iOS Data Transfer

Users looking to switch from an iOS to Android ecosystem or vice versa often face less of a challenge than...
Redazione RHC - 19 December 2025
Ink Dragon Targets Europe: Exploiting SharePoint and IIS Vulnerabilities Cybercrime

Ink Dragon Targets Europe: Exploiting SharePoint and IIS Vulnerabilities

This news comes to us from Recorded Future (Insikt Group) News & Research feed: Check Point Research has documented a...
Sandro Sana - 19 December 2025
Bypassing AI Safety: EchoGram Exposes Vulnerabilities in LLM Defenses Cybercrime

Bypassing AI Safety: EchoGram Exposes Vulnerabilities in LLM Defenses

Large language models are typically released with security constraints : separate AIs from the main LLM ensure that malicious suggestions...
Redazione RHC - 19 December 2025

WhatsApp: all it takes is a phone number to know when you sleep, go out, or come home

A tool has been released that allows for the discreet monitoring of WhatsApp and Signal user activity using just a phone number. The tracking mechanism covers over three billion accounts...
Share on Facebook Share on LinkedIn Share on X

Cyber Geopolitics: How Tech Becomes a Global Battleground

Over the past two years, cyber has ceased to be a " technical " dimension of the conflict and has become a strategic infrastructure. The consequence is a domino effect:...
Share on Facebook Share on LinkedIn Share on X

SOAP Vulnerability in .NET Framework Allows Remote Code Execution

Security researchers have discovered a vulnerability in .NET that could affect several enterprise products and lead to remote code execution. The issue stems from the way Microsoft .NET-based applications handle...
Share on Facebook Share on LinkedIn Share on X

CVE-2025-55182 React Server Components Vulnerability Exploited

A recent report from the Google Threat Intelligence Group (GTIG) illustrates the chaotic results of this information dissemination, highlighting how savvy adversaries have already gained a foothold within targeted networks....
Share on Facebook Share on LinkedIn Share on X

Top 25 Software Vulnerabilities 2025: MITRE CWE Ranking and Security Tips

MITRE has released its ranking of the 25 most dangerous software vulnerabilities predicted for 2025, based on data collected through the National Vulnerability Database. These vulnerabilities were identified by analyzing...
Share on Facebook Share on LinkedIn Share on X

The Future of Work: 4-Day Week with AI and Tech Advances

The prospect of a four-day workweek, with a resulting three-day long weekend, may not be far off. This is according to Christopher A. Pissarides , a British-Cypriot economist and Nobel...
Share on Facebook Share on LinkedIn Share on X

ARTEMIS Leads in AI-Powered Pentesting, Outperforming Human Experts

Stanford researchers and their colleagues conducted an unusual experiment: they compared the performance of ten professional specialists and a set of autonomous AI agents in a real-world corporate pentest. The...
Share on Facebook Share on LinkedIn Share on X

Apple Patches Critical WebKit Vulnerabilities in iOS Update

Following the discovery of two critical zero-day vulnerabilities in the WebKit browser engine, Apple has urgently released security updates for iPhone and iPad users. Both vulnerabilities reside in WebKit ,...
Share on Facebook Share on LinkedIn Share on X

Kali Linux 2025.4: Discover the Power of Wayland and Enhanced Security Tools

The recent 2025.4 release of Kali Linux has been made available to the public, introducing significant improvements to the GNOME, KDE, and Xfce desktop environments . From now on, Wayland...
Share on Facebook Share on LinkedIn Share on X

French Interior Ministry Hit by Cyberattack, Data Security at Risk

The French Ministry of the Interior's email servers were targeted by a cyberattack. The hacker managed to access "several files," but no "serious compromise" has been detected so far. The...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
OpenAI Hiring Chief Security Officer to Mitigate AI Risks
Redazione RHC - 30/12/2025

OpenAI, the developer of ChatGPT, has announced the search for a new Chief Security Officer . The position, with an annual salary of $555,000, will be directly responsible for mitigating risks associated with artificial intelligence…

Immagine del sitoCybercrime
Apple Supply Chain Hit by Cyberattack: Sensitive Data at Risk
Redazione RHC - 30/12/2025

During the first half of December, a Chinese company assembling devices for Apple was hit by an advanced cyberattack that may have exposed sensitive information related to a production line. The incident was reported by…

Immagine del sitoCybercrime
Browser-in-the-Browser Phishing Attack: How to Protect Yourself
Manuel Roccon - 29/12/2025

This article analyzes a recent and sophisticated phishing campaign that uses the Browser-in-the-Browser (BitB) technique to steal credentials, particularly those from services like Microsoft 365. The BitB attack is notable for its ability to generate…

Immagine del sitoCybercrime
Critical WebKit Vulnerability Exposes iOS Devices to Code Execution
Redazione RHC - 29/12/2025

A new report details a critical vulnerability discovered by security researcher Joseph Goydish in Apple’s WebKit engine. This security flaw, if exploited in conjunction with other exploits, could allow attackers to execute arbitrary code on…

Immagine del sitoCybercrime
Xspeeder Devices Hit by AI-Discovered Zero-Day Vulnerability CVE-2025-54322
Redazione RHC - 29/12/2025

When it comes to cybersecurity, it’s easy to fall into the trap of thinking that problems are always far away, that they only affect others. But the reality is that a vulnerability is always around…