Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Fortinet 320x100px
LECS 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
China is using artificial intelligence to improve mass surveillance
Di Redazione RHC - 06/11/2025

In Beijing, in a banquet hall of a luxury hotel, police officers from across the country attended a conference dedicated to the application of artificial intelligence to public safety . The event open...

Immagine del sito
Rust Rebels! Fund Launched to Pay Open Source Maintainers
Di Redazione RHC - 06/11/2025

The Rust Foundation has announced the launch of the Maintainers Fund, a new program designed to support developers responsible for the stability and development of the Rust ecosystem. This step aims t...

Immagine del sito
12.5 million HD movies per second! Amazon’s undersea cable will connect the US to Ireland.
Di Redazione RHC - 06/11/2025

In a few years, Ireland and the United States will be connected by an undersea communications cable designed to help Amazon improve its AWS services. Undersea cables are a vital part of the infrastruc...

Immagine del sito
They told you 6G would be fast, right? But they didn’t tell you the whole truth
Di Sandro Sana - 06/11/2025

It’s not “ just faster ”: 6G changes the very nature of the network! When we talk about 6G, we risk reducing everything to a speed upgrade, as if the network of the future were simply a 5G w...

Immagine del sito
Microsoft Exchange Server Penetration Testing: Techniques, Tools, and Countermeasures
Di Alessandro Molinari - 06/11/2025

Often, during penetration testing, we find ourselves with elevated access (Domain Admin) within an organization. Some companies stop there, thinking that obtaining Domain Admin is the ultimate goal. B...

Gemini 3.0 Pro: What people who are trying it say

In recent days, a select few users have reported having access to the new Gemini 3.0 Pro model. Initial impressions suggest a significant improvement ...
Redazione RHC - 28/10/2025 - 07:47

From Body to Screen: How Sexual Abuse Has Moved to the Digital World

This is the second in a series of articles analyzing gender-based violence in the digital context, in anticipation of November 25th, the International...
Paolo Galdieri - 28/10/2025 - 07:07

Apache Tomcat Vulnerability: Update Now to Avoid Security Risks

Many web applications rely on Apache Tomcat, a widely used open-source Java servlet container. On October 27, 2025, Apache disclosed two vulnerabiliti...
Redazione RHC - 28/10/2025 - 06:52

Paycheck piracy is coming! And the paycheck transfer goes to criminals.

According to a new report from Microsoft Threat Intelligence , the financially motivated Storm-2657 group is conducting large-scale attacks against un...
Redazione RHC - 28/10/2025 - 06:40

CrowdStrike: 76% of organizations struggle to combat AI attacks

Enterprises are lagging behind in ransomware preparedness as adversaries use AI across the attack chain to accelerate intrusion, encryption and extort...
Redazione RHC - 28/10/2025 - 06:30

Whisper 2FA: The New Phishing Tool That Steals Microsoft 365 Credentials

According to new research from Barracuda Networks , a particularly insidious and persistent new Phishing-as-a-Service (PhaaS) kit is stealing credenti...
Redazione RHC - 27/10/2025 - 17:45
1 14 15 16 17 18 223

Gemini 3.0 Pro: What people who are trying it say

- October 28th, 2025

In recent days, a select few users have reported having access to the new Gemini 3.0 Pro model. Initial impressions suggest a significant improvement over the previous generation, so much...

Facebook Linkedin X

From Body to Screen: How Sexual Abuse Has Moved to the Digital World

- October 28th, 2025

This is the second in a series of articles analyzing gender-based violence in the digital context, in anticipation of November 25th, the International Day for the Elimination of Violence against...

Facebook Linkedin X

Apache Tomcat Vulnerability: Update Now to Avoid Security Risks

- October 28th, 2025

Many web applications rely on Apache Tomcat, a widely used open-source Java servlet container. On October 27, 2025, Apache disclosed two vulnerabilities: CVE-2025-55752 and CVE-2025-55754, affecting several versions of Tomcat....

Facebook Linkedin X

Paycheck piracy is coming! And the paycheck transfer goes to criminals.

- October 28th, 2025

According to a new report from Microsoft Threat Intelligence , the financially motivated Storm-2657 group is conducting large-scale attacks against universities and businesses , using stolen employee accounts to redirect...

Facebook Linkedin X

CrowdStrike: 76% of organizations struggle to combat AI attacks

- October 28th, 2025

Enterprises are lagging behind in ransomware preparedness as adversaries use AI across the attack chain to accelerate intrusion, encryption and extortion. Milan – October 27, 2025 – According to CrowdStrike...

Facebook Linkedin X

Whisper 2FA: The New Phishing Tool That Steals Microsoft 365 Credentials

- October 27th, 2025

According to new research from Barracuda Networks , a particularly insidious and persistent new Phishing-as-a-Service (PhaaS) kit is stealing credentials and authentication tokens from Microsoft 365 users. Barracuda experts have...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE