Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Fortinet 320x100px
Redhotcyber Banner Sito 970x120px Uscita 101125

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

WatchGuard Firewall Zero-Day Vulnerability CVE-2025-14733 Exploited Cybercrime

WatchGuard Firewall Zero-Day Vulnerability CVE-2025-14733 Exploited

A critical zero-day vulnerability, identified as CVE-2025-14733, has left network administrators on their knees, forcing them into a race against...
Redazione RHC - 19 December 2025
Linux Kernel CVE-2025-68260 Vulnerability Fixed: Rust Code at Risk Vulnerability

Linux Kernel CVE-2025-68260 Vulnerability Fixed: Rust Code at Risk

The world of technology is a veritable battlefield, where coding geniuses challenge malicious attackers every day with exploits and security...
Redazione RHC - 19 December 2025
Google and Apple Embrace Interoperability with Android iOS Data Transfer Cybercrime

Google and Apple Embrace Interoperability with Android iOS Data Transfer

Users looking to switch from an iOS to Android ecosystem or vice versa often face less of a challenge than...
Redazione RHC - 19 December 2025
Ink Dragon Targets Europe: Exploiting SharePoint and IIS Vulnerabilities Cybercrime

Ink Dragon Targets Europe: Exploiting SharePoint and IIS Vulnerabilities

This news comes to us from Recorded Future (Insikt Group) News & Research feed: Check Point Research has documented a...
Sandro Sana - 19 December 2025
Bypassing AI Safety: EchoGram Exposes Vulnerabilities in LLM Defenses Cybercrime

Bypassing AI Safety: EchoGram Exposes Vulnerabilities in LLM Defenses

Large language models are typically released with security constraints : separate AIs from the main LLM ensure that malicious suggestions...
Redazione RHC - 19 December 2025
E-Note Shutdown: Major Blow to Cybercrime and Ransomware Cybercrime

E-Note Shutdown: Major Blow to Cybercrime and Ransomware

When we talk about cybercrime, we often think of something far away, something that doesn't concern us. But the truth...
Redazione RHC - 19 December 2025

The Future of Work: 4-Day Week with AI and Tech Advances

The prospect of a four-day workweek, with a resulting three-day long weekend, may not be far off. This is according to Christopher A. Pissarides , a British-Cypriot economist and Nobel...
Share on Facebook Share on LinkedIn Share on X

ARTEMIS Leads in AI-Powered Pentesting, Outperforming Human Experts

Stanford researchers and their colleagues conducted an unusual experiment: they compared the performance of ten professional specialists and a set of autonomous AI agents in a real-world corporate pentest. The...
Share on Facebook Share on LinkedIn Share on X

Apple Patches Critical WebKit Vulnerabilities in iOS Update

Following the discovery of two critical zero-day vulnerabilities in the WebKit browser engine, Apple has urgently released security updates for iPhone and iPad users. Both vulnerabilities reside in WebKit ,...
Share on Facebook Share on LinkedIn Share on X

Kali Linux 2025.4: Discover the Power of Wayland and Enhanced Security Tools

The recent 2025.4 release of Kali Linux has been made available to the public, introducing significant improvements to the GNOME, KDE, and Xfce desktop environments . From now on, Wayland...
Share on Facebook Share on LinkedIn Share on X

French Interior Ministry Hit by Cyberattack, Data Security at Risk

The French Ministry of the Interior's email servers were targeted by a cyberattack. The hacker managed to access "several files," but no "serious compromise" has been detected so far. The...
Share on Facebook Share on LinkedIn Share on X

IRS.GOV: alleged data breach affects the accounts of 18 million citizens

An alleged database containing sensitive information on 18 million U.S. citizens over 65 has appeared for sale on a popular dark web forum. The advertiser, who uses the pseudonym "Frenshyny,"...
Share on Facebook Share on LinkedIn Share on X

Amnesty International Launches .onion Site for Secure Access to Human Rights Info

Amnesty International has launched its own website, accessible via the .onion domain on the Tor network, offering a new secure channel for accessing the organization's information and research. The initiative,...
Share on Facebook Share on LinkedIn Share on X

NANOREMOTE Trojan Uses Google Drive for Command and Control

A new multifunctional Windows Trojan called NANOREMOTE uses a cloud file storage service as its command center , making the threat harder to detect and giving attackers a persistent channel...
Share on Facebook Share on LinkedIn Share on X

Microsoft Azure OAuth Attack: ConsentFix Malware Steals Accounts

A new scheme called " ConsentFix " expands the capabilities of the already known ClickFix social media attack and allows Microsoft accounts to be hijacked without a password or multi-factor...
Share on Facebook Share on LinkedIn Share on X

Linux Foundation Launches Agentic AI Foundation with Key Tech Players

The establishment of the Agentic AI Foundation (AAIF), a dedicated fund under the auspices of the Linux Foundation , was jointly announced by several leading companies in the field of...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Ransomware Attacks on the Rise: US Professionals Turn to Cybercrime
Redazione RHC - 31/12/2025

In the landscape of cybercrime investigations, some cases take on particular significance not only because of the extent of the financial damage, but also because of the profile of the individuals involved . Ransomware investigations,…

Immagine del sitoCybercrime
The Dark Side of Cybercrime: Human Costs and Consequences
Redazione RHC - 31/12/2025

By 2025, cybercrime will increasingly go beyond “just money”: attacks aren’t just about downtime bills and ransom payments , but also about real human consequences, from healthcare disruptions and victim harassment to kidnappings, torture, and…

Immagine del sitoCybercrime
OpenAI Hiring Chief Security Officer to Mitigate AI Risks
Redazione RHC - 30/12/2025

OpenAI, the developer of ChatGPT, has announced the search for a new Chief Security Officer . The position, with an annual salary of $555,000, will be directly responsible for mitigating risks associated with artificial intelligence…

Immagine del sitoCybercrime
Apple Supply Chain Hit by Cyberattack: Sensitive Data at Risk
Redazione RHC - 30/12/2025

During the first half of December, a Chinese company assembling devices for Apple was hit by an advanced cyberattack that may have exposed sensitive information related to a production line. The incident was reported by…

Immagine del sitoCybercrime
Browser-in-the-Browser Phishing Attack: How to Protect Yourself
Manuel Roccon - 29/12/2025

This article analyzes a recent and sophisticated phishing campaign that uses the Browser-in-the-Browser (BitB) technique to steal credentials, particularly those from services like Microsoft 365. The BitB attack is notable for its ability to generate…