Welcome to Red Hot Cyber | Cybersecurity News
Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
320×100
2nd Edition GlitchZone RHC 970x120 2

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
The Dark Side of Internet Control: Durov’s Warning
Di Sandro Sana - 02/12/2025

Post 462 on Durov’s official channel immediately went into “scream mode”: “ The end of the free internet. The free internet is becoming a tool of control .” No birthday wishes. Durov explain...

Immagine del sito
Brazilian Systems Targeted in Sophisticated OAST Exploit Campaign
Di Redazione RHC - 01/12/2025

Security researchers have discovered a sophisticated exploit campaign that leverages a private out-of-band application security testing (OAST) service hosted on Google Cloud infrastructure. The campai...

Immagine del sito
KrakenBite Phishing Service Exposed
Di Redazione RHC - 01/12/2025

The underground cybercrime market continues to evolve rapidly, fueled by specialized groups designing and selling tools for increasingly sophisticated digital scams. Among these, a particularly active...

Immagine del sito
ADC Aerospace Hit by Play Ransomware Attack, Data Breach Feared
Di Redazione RHC - 01/12/2025

American aviation and defense components manufacturer ADC Aerospace has found itself in the spotlight due to a possible cyber attack by the Play ransomware group, which appeared on their blog where cr...

Immagine del sito
Microsoft 365 Security Risk: Interface Poisoning Attacks
Di Massimiliano Dal Cero - 01/12/2025

This article analyzes the disclosure submitted to Microsoft and available in English on digitaldefense , where images, demonstration videos and a Python code example are available. In recent years, di...

Google Gemini Improves AI-Generated Image Verification

Google has expanded the capabilities of its Gemini artificial intelligence service by adding a tool to the app and web version to check images for sig...
Redazione RHC - 23/11/2025 - 09:37

“We Want to Hack You Again!” NSO Group Rejects WhatsApp’s Pegasus Lawsuit

Israeli company NSO Group has appealed a California federal court ruling that bars it from using WhatsApp's infrastructure to distribute its Pegasus s...
Redazione RHC - 22/11/2025 - 19:32

Oracle under attack: Pre-auth RCE vulnerability discovered that compromises entire systems

A vulnerability, designated CVE-2025-61757, was made public by Searchlight Cyber last Thursday. Company researchers discovered the issue and notified ...
Redazione RHC - 22/11/2025 - 12:31

CrowdStrike Insider Fired for Providing Sensitive Data to Criminal Hackers

In recent months, the insider problem has become increasingly important for large companies , and one recent episode involved CrowdStrike. The cyberse...
Redazione RHC - 22/11/2025 - 09:29

Sysmon will finally be integrated into Windows 11 and Windows Server 2025 in 2026

Microsoft has announced that it will integrate the popular Sysmon tool directly into Windows 11 and Windows Server 2025 in 2026. The announcement was ...
Redazione RHC - 22/11/2025 - 08:53

Sneaky2FA: The phishing scam that steals credentials with browser-in-the-browser attacks

Push Security specialists have noticed that the Sneaky2FA phishing platform now supports browser-in-the-browser attacks, which allow the creation of f...
Redazione RHC - 22/11/2025 - 08:39
1 10 11 12 13 14 261

Google Gemini Improves AI-Generated Image Verification

- November 22nd, 2025

Google has expanded the capabilities of its Gemini artificial intelligence service by adding a tool to the app and web version to check images for signs of automatic generation ....

Facebook Linkedin X

“We Want to Hack You Again!” NSO Group Rejects WhatsApp’s Pegasus Lawsuit

- November 21st, 2025

Israeli company NSO Group has appealed a California federal court ruling that bars it from using WhatsApp's infrastructure to distribute its Pegasus surveillance software. The case, which has been ongoing...

Facebook Linkedin X

Oracle under attack: Pre-auth RCE vulnerability discovered that compromises entire systems

- November 21st, 2025

A vulnerability, designated CVE-2025-61757, was made public by Searchlight Cyber last Thursday. Company researchers discovered the issue and notified Oracle, which led to its disclosure. Oracle fixed CVE-2025-61757 with the...

Facebook Linkedin X

CrowdStrike Insider Fired for Providing Sensitive Data to Criminal Hackers

- November 21st, 2025

In recent months, the insider problem has become increasingly important for large companies , and one recent episode involved CrowdStrike. The cybersecurity firm has in fact removed an employee believed...

Facebook Linkedin X

Sysmon will finally be integrated into Windows 11 and Windows Server 2025 in 2026

- November 21st, 2025

Microsoft has announced that it will integrate the popular Sysmon tool directly into Windows 11 and Windows Server 2025 in 2026. The announcement was made by Sysinternals creator Mark Russinovich....

Facebook Linkedin X

Sneaky2FA: The phishing scam that steals credentials with browser-in-the-browser attacks

- November 21st, 2025

Push Security specialists have noticed that the Sneaky2FA phishing platform now supports browser-in-the-browser attacks, which allow the creation of fake login windows and the theft of credentials and sessions. Sneaky2FA...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE