Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320x100 Itcentric
Banner Ransomfeed 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Uncovering Dark AI: The Truth Behind Crime-as-a-Service Chatbots Cybercrime

Uncovering Dark AI: The Truth Behind Crime-as-a-Service Chatbots

In recent months, the cybersecurity landscape has been awash with media hype surrounding new AI Dark Chatbots promoted as "Crime-as-a-Service"...
Redazione RHC - 12 January 2026
AI-Generated Mac Malware: SimpleStealth Threatens User Security Cybercrime

AI-Generated Mac Malware: SimpleStealth Threatens User Security

A group of industry specialists has identified for the first time a macOS malware whose code clearly shows signs of...
Redazione RHC - 11 January 2026
Linus Torvalds on AI Coding: ‘It’s Just Another Tool’ Cybercrime

Linus Torvalds on AI Coding: ‘It’s Just Another Tool’

Linus Torvalds, the creator of Linux, has expressed a firm and uncompromising position regarding the debate over the integration and...
Redazione RHC - 11 January 2026
The Future of Tech: Sovereignty, Security, and Cloud Control Cybercrime

The Future of Tech: Sovereignty, Security, and Cloud Control

In today's world, technology is no longer a mere tool for efficiency or convenience, but a primary geopolitical lever ....
Redazione RHC - 11 January 2026
Internet Shutdowns Cost $19.7B in 2025, Sophisticated Censorship Rises Cybercrime

Internet Shutdowns Cost $19.7B in 2025, Sophisticated Censorship Rises

Imagine a situation where the internet appears to be working, but websites won't open beyond the first screen, messaging apps...
Redazione RHC - 11 January 2026
Doom on a Smart Pressure Cooker: The Ultimate IoT Hack Cybercrime

Doom on a Smart Pressure Cooker: The Ultimate IoT Hack

The line between home appliances and gaming consoles continues to blur. The latest frontier of " extreme porting" features the...
Redazione RHC - 10 January 2026

PS5 BootROM Key Leaked, Sony’s Security Compromised

A recent incident saw an anonymous hacker leak a crucial security key used by Sony to safeguard the integrity of the chain of trust in the PlayStation 5 console. This...
Share on Facebook Share on LinkedIn Share on X

China Achieves Quantum Error Correction Breakthrough with Microchip

For years, quantum computers have seemed like a futuristic technology: on paper, they can solve problems that classical machines can’t handle in a reasonable time, but in reality they constantly...
Share on Facebook Share on LinkedIn Share on X

Critical GNU Wget2 Vulnerability Exposes Users to File Overwrite Attacks

A serious vulnerability has been discovered in the popular GNU command-line downloader Wget2 , which allows attackers to overwrite files on the victim's computer without their knowledge or consent. The...
Share on Facebook Share on LinkedIn Share on X

Windows 11 Performance Test: Surprising Results with Windows 8.1

A comparison test across six generations of Windows was conducted by YouTube channel TrigrZolt , which unexpectedly revealed a clear winner: Windows 8.1. Windows 11, on the other hand, performed...
Share on Facebook Share on LinkedIn Share on X

PentestAgent: Revolutionizing Penetration Testing with AI-Powered Tools

PentestAgent is another new open source project developed by the GH05TCREW group that aims to support penetration testing activities through the use of agents based on language models. The tool...
Share on Facebook Share on LinkedIn Share on X

US Treasury Removes Sanctions on Intellexa Spyware Developers

The U.S. Treasury Department unexpectedly removed from its sanctions list three individuals previously accused of ties to Intellexa , the developer of the Predator spyware . The decision was made...
Share on Facebook Share on LinkedIn Share on X

Rue Language: Revolutionizing System Programming with AI

Veteran software developer Steve Klabnik, who helped create Rust and Ruby on Rails, has started work on a new programming language called Rue . The name may seem ambiguous— it...
Share on Facebook Share on LinkedIn Share on X

Password Security: The Impact of Human Behavior on Password Strength

Password security and human behavior are more connected than we think. In previous episodes, we tried to shift our focus: passwords don't just protect systems, they tell stories about people....
Share on Facebook Share on LinkedIn Share on X

Potential Data Breach at Pickett USA Exposes Critical Energy Infrastructure

An unknown attacker claims to have hacked Pickett and Associates (Pickett USA), a Florida-based engineering firm, and is now selling a large amount of engineering data related to projects managed...
Share on Facebook Share on LinkedIn Share on X

Forensic Timeliner: Advanced Digital Forensics Tool for DFIR Analysis

Forensic Timeliner is a high-performance forensic processing engine designed to support DFIR (Digital Forensics and Incident Response ) analysts in artifact triage and correlation. The tool allows you to quickly...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Fortinet FortiOS Vulnerability Exploited: CVE-2025-59718 Patch Bypass
Redazione RHC - 22/01/2026

Attackers are exploiting a previously patched critical FortiGate authentication flaw (CVE-2025-59718) through a patch bypass method to breach protected firewalls, as Fortinet customers are experiencing. Fortinet reportedly plans to soon release FortiOS versions 7.4.11, 7.6.6,…

Immagine del sitoCybercrime
Cisco Zero-Day Vulnerability CVE-2026-20045 Actively Exploited
Redazione RHC - 22/01/2026

A critical zero-day remote code execution (RCE) vulnerability, identified as CVE-2026-20045, has been discovered by Cisco and is being actively exploited in active attacks. Cisco has urged immediate patching, and its Product Security Incident Response…

Immagine del sitoinnovation
Red Hot Cyber and Hack The Box: together for the CTF at the RHC 2026 conference
Redazione RHC - 21/01/2026

In the Italian and European cybersecurity landscape, few collaborations manage to combine educational vision, technical realism, and community impact as effectively as the partnership announced between Red Hot Cyber and Hack The Box (HTB) for…

Immagine del sitoCybercrime
Everest Ransomware Attacks McDonald’s, 861GB Data Stolen
Redazione RHC - 21/01/2026

Yesterday, the Everest cybercriminal gang claimed responsibility for a cyberattack on McDonald’s on their Data Leak Site (DLS) . From the gang’s post, the cybercriminals claim to have 861GB of data exfiltrated from the company’s…

Immagine del sitoCybercrime
ESXi Zero-Day Exploit: How to Protect Your VMware Environment
Redazione RHC - 20/01/2026

A group of attackers is using a zero-day exploit toolkit to compromise VMware ESXi instances in an uncontrolled manner, taking advantage of multiple vulnerabilities to bypass virtual machine restrictions. The current incident highlights the ongoing…