Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Red Hot Cyber Academy

Red Hot Cyber. The Cybersecurity Blog

- July 12th, 2025 - (Posted in Cybercrime and Darknet)
Cyber warfare is a form of conflict that takes place at the cyber and digital level. This form of warfare has become increasingly widespread in recent years, thanks to the growing dependence of modern societies on technology and information. In this article, we will explore the nature of cyber warfare,...

Digital Anonymity in Danger! What is the European Union deciding?

In recent years, political attention has expanded beyond the national borders of different states. Since the now outdated pandemic caused by COVID-19 and the (re)emergence of different conflicts in different parts of the world have expanded public information by bringing

Microsoft 365 Under Attack: How Hackers Use Direct Send to Send Phishing Emails

- June 27th, 2025

A sophisticated phishing campaign that targeted over 70 organizations by exploiting Microsoft 365's Direct Send feature. The campaign, which began in May 2025 and has shown steady activity over the...

  

Warning! WinRAR: Critical Vulnerability That Could Run Malware

- June 26th, 2025

WinRAR developers have fixed a Directory Traversal vulnerability, which has been assigned the identifier CVE-2025-6218. Under certain circumstances, this bug allowed malware to be executed after the archive was extracted....

  

He died because of ransomware! Another victim joins the list

- June 26th, 2025

This is not the first time that a cyber attack has resulted in the loss of human lives.We had already discussed it in the article "I deferichò per il ransomware....

  

A new fileless infostealer is being spread by Telegram and legitimate services

- June 26th, 2025

TLP: AMBERAnalyst: Agostino Pellegrino, Crescenzo Cuoppolo, Alessio BandiniLast revision date: 2025-06-24 This forensic technical report documents the complete analysis of a multi-stage infostealer delivered via a Python fileless loader, identified...

  

Sign up for the newsletter