Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Crowdstrike 320×100
970x20 Itcentric

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Amnesty International Launches .onion Site for Secure Access to Human Rights Info Cybercrime

Amnesty International Launches .onion Site for Secure Access to Human Rights Info

Amnesty International has launched its own website, accessible via the .onion domain on the Tor network, offering a new secure...
Redazione RHC - 12 December 2025
NANOREMOTE Trojan Uses Google Drive for Command and Control Cybercrime

NANOREMOTE Trojan Uses Google Drive for Command and Control

A new multifunctional Windows Trojan called NANOREMOTE uses a cloud file storage service as its command center , making the...
Redazione RHC - 12 December 2025
Microsoft Azure OAuth Attack: ConsentFix Malware Steals Accounts Cybercrime

Microsoft Azure OAuth Attack: ConsentFix Malware Steals Accounts

A new scheme called " ConsentFix " expands the capabilities of the already known ClickFix social media attack and allows...
Redazione RHC - 12 December 2025
Linux Foundation Launches Agentic AI Foundation with Key Tech Players Cybercrime

Linux Foundation Launches Agentic AI Foundation with Key Tech Players

The establishment of the Agentic AI Foundation (AAIF), a dedicated fund under the auspices of the Linux Foundation , was...
Redazione RHC - 12 December 2025
Disney Invests $1 Billion in OpenAI for Sora Video Deal Cybercrime

Disney Invests $1 Billion in OpenAI for Sora Video Deal

Disney will invest $1 billion in OpenAI and officially license its characters for use in its Sora video generator. The...
Redazione RHC - 12 December 2025
Microsoft 365 Okta Phishing Attack: Experts Warn of New Threat Cybercrime

Microsoft 365 Okta Phishing Attack: Experts Warn of New Threat

A recent study by Datadog Security Labs reveals an ongoing operation targeting organizations using Microsoft 365 and Okta for single...
Redazione RHC - 12 December 2025

China Accuses US of Cyber Attacks, Denies Involvement in Brickstorm Malware

A spokesperson for the Chinese Embassy in Canada responded to a reporter's question about the outcry in Canada over so-called "Chinese cyber attacks." A reporter asked : Recently, the Canadian...
Share on Facebook Share on LinkedIn Share on X

AI Browser Attack: Google Drive Wiper Threat Exposed

Researchers at Striker STAR Labs have described a new agent-based browser attack that can turn a regular email into a near-complete wiper of your Google Drive inbox. The attack targets...
Share on Facebook Share on LinkedIn Share on X

NATO Cyber Coalition Exercise: Enhancing Cyber Defense with 1,300 Experts

NATO held its largest-ever cyber defense exercise, Cyber Coalition, in Estonia, involving approximately 1,300 specialists . The goal was to practice protecting critical infrastructure from large-scale cyber attacks, simulating scenarios...
Share on Facebook Share on LinkedIn Share on X

Microsoft 365 Price Hike: What You Need to Know About the 2026 Increase

Starting July 1, 2026, Microsoft 365 and Office 365 subscription prices for business and government customers will increase by 8% to 33% , depending on the plan. This price adjustment...
Share on Facebook Share on LinkedIn Share on X

React2Shell Vulnerability Exploited by China-Linked Hackers, Patch Now

We often discuss on this site that the window between the publication of an exploit and the launch of active attacks is drastically shrinking. For this reason, it's increasingly crucial...
Share on Facebook Share on LinkedIn Share on X

FreeBSD 15.0: Discover the Power of This Unix-like Operating System

Behind many of the digital applications and services we take for granted every day lies a silent giant: FreeBSD . Known primarily to insiders, this Unix-like operating system has become...
Share on Facebook Share on LinkedIn Share on X

Cloudflare Blocks AI Bots: The Future of Internet Economy at Stake

Since July 1st, Cloudflare has blocked 416 billion requests from artificial intelligence bots attempting to extract content from its customers' websites. According to Matthew Prince, co-founder and CEO of Cloudflare,...
Share on Facebook Share on LinkedIn Share on X

React2Shell Vulnerability: 8.7M Servers at Risk – CVE-2025-55182

In 2025, the IT and security communities are buzzing with excitement over a single name: " React2Shell ." With the disclosure of a new vulnerability, CVE-2025-55182, classified as CVSS 10.0,...
Share on Facebook Share on LinkedIn Share on X

Cloudflare Just Broke the Internet… Again. Centralization Risks Exposed

Cloudflare is back in the spotlight after a new wave of outages that, on December 5, 2025, is affecting several components of the platform. In addition to the Dashboard and...
Share on Facebook Share on LinkedIn Share on X

Chinese Cyber Spies Use Brickstorm Malware to Infiltrate Critical Networks

Chinese cyber spies have been lurking in the networks of critical organizations for years, infecting infrastructure with sophisticated malware and stealing data, government agencies and private experts warn. According to...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Webrat Malware Targets Security Researchers with GitHub Exploit Traps
Redazione RHC - 24/12/2025

There’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…

Immagine del sitoCybercrime
A backdoor in NVIDIA code. Three 9.8 bugs plague AI and robotics development systems
Redazione RHC - 24/12/2025

When it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…

Immagine del sitoCybercrime
La Poste Hit by Pro-Russian DDoS Attack During Peak Holiday Season
Redazione RHC - 23/12/2025

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…

Immagine del sitoVulnerability
CVE-2025-47761: FortiClient VPN Zero-Day Exploit Lets Privilege Escalation
Manuel Roccon - 23/12/2025

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…

Immagine del sitoCybercrime
Critical MongoDB Vulnerability Exposed: CVE-2025-14847
Redazione RHC - 23/12/2025

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…