Red Hot Cyber. The Cybersecurity Blog

Critical Vulnerabilities Discovered in Hundreds of Brother and Other Printers
Hundreds of printer models from Brother and other manufacturers (Fujifilm, Toshiba, Ricoh and Konica Minolta) have been found to be vulnerable to serious vulnerabilities discovered by researchers at Rapid7. For example, the printers come with a default administrator password that

Pope warns: “AI is not the devil, but it can become one without ethics”
The head of the Catholic Churchhas expressed concern about the way today’s children and adolescents interact with digital technologies. In his viewthe abundance of information available through neural networks and other intelligent systems can seriously affect the mental and intellectual

Microsoft 365 Under Attack: How Hackers Use Direct Send to Send Phishing Emails
A sophisticated phishing campaign that targeted over 70 organizations by exploiting Microsoft 365’s Direct Send feature. The campaign, which began in May 2025 and has shown steady activity over the past two months, primarily targets U.S.-based organizations across multiple industries

Warning! WinRAR: Critical Vulnerability That Could Run Malware
WinRAR developers have fixed a Directory Traversal vulnerability, which has been assigned the identifier CVE-2025-6218. Under certain circumstances, this bug allowed malware to be executed after the archive was extracted. The vulnerability received a score of 7.8 on the CVSS

He died because of ransomware! Another victim joins the list
This is not the first time that a cyber attack has resulted in the loss of human lives.We had already discussed it in the article “I deferichò per il ransomware. I casi noto, le tendenze e il punto sull’Italia“, in

A new fileless infostealer is being spread by Telegram and legitimate services
TLP: AMBERAnalyst: Agostino Pellegrino, Crescenzo Cuoppolo, Alessio BandiniLast revision date: 2025-06-24 This forensic technical report documents the complete analysis of a multi-stage infostealer delivered via a Python fileless loader, identified with the acronym “AP”. The entire infection chain runs in

The Story of Open Source: A Success Story of Humankind
Massimiliano Brolli - July 2nd, 2025
Author: Massimiliano Brolli, Pietro CornelioPublishing Date: 11/01/2021 Open source software is so present and integrated into our daily lives today that it would be difficult to think of a world...

Do you really know what Hacktivism means? It’s a “special message of hope!”
Redazione RHC - July 2nd, 2025
“Hacktivism, a special message of hope." Thus begins the "Hacktivism Declaration", published on July 4, 2001 by the famous hacker group Cult of the dead Cow (also called cDc or...

The History of FreeBSD
Redazione RHC - July 2nd, 2025
We have often talked about Linux and the open source world, Windows and proprietary software and operating systems in general. But starting from the seed of Ken Thompson's Unix, many...

HoneyPLC: the new honeypot that revolutionizes the defense of industrial plants
Redazione RHC - July 2nd, 2025
Industrial Control Systems (ICS), critical to the operation of critical infrastructure such as power, water and transportation networks, are increasingly vulnerable to cyberattacks. In this context, the article HoneyPLC: A...
Sign up for the newsletter