Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Ransomfeed 320x100 1
970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
The Louvre’s security myth crumbles! Between audits, ridiculous passwords, and outdated cameras.
Di Redazione RHC - 07/11/2025

The recent theft at the Louvre Museum, located in the heart of Paris, has shocked not only the art world but also the cybersecurity world. On the night of October 22, 2025, several French crown jewels...

Immagine del sito
Double-dealing: employees of a company that resolved ransomware attacks were launching them themselves
Di Redazione RHC - 07/11/2025

Three former DigitalMint employees, who investigated ransomware incidents and negotiated with ransomware groups, are accused of hacking into the networks of five American companies. According to the U...

Immagine del sito
2 critical bugs detected on Cisco Unified Contact Center Express (CCX)
Di Redazione RHC - 07/11/2025

Cisco has published two new critical vulnerabilities affecting Cisco Unified Contact Center Express (CCX) , the platform used by thousands of companies to manage contact centers and unified communicat...

Immagine del sito
China is using artificial intelligence to improve mass surveillance
Di Redazione RHC - 06/11/2025

In Beijing, in a banquet hall of a luxury hotel, police officers from across the country attended a conference dedicated to the application of artificial intelligence to public safety . The event open...

Immagine del sito
Rust Rebels! Fund Launched to Pay Open Source Maintainers
Di Redazione RHC - 06/11/2025

The Rust Foundation has announced the launch of the Maintainers Fund, a new program designed to support developers responsible for the stability and development of the Rust ecosystem. This step aims t...

Australia: Microsoft accused of deceptive practices in Microsoft 365 renewals

Australia's competition watchdog, the ACCC, said subscribers to Microsoft 365 Personal and Family plans were being asked to pay higher prices for Copi...
Redazione RHC - 27/10/2025 - 13:01

Criminal Hackers Breach US Nuclear Weapons Production Facilities

Government hackers breached a nuclear weapons component manufacturing facility in the United States by exploiting vulnerabilities in Microsoft SharePo...
Redazione RHC - 27/10/2025 - 11:12

The secret behind Space Invaders’ speed? A technical limitation of the hardware

In 1978, Taito's Space Invaders captivated audiences with its seemingly ingenious gameplay: the more aliens you shot down, the faster the remaining on...
Redazione RHC - 27/10/2025 - 10:37

$2.8 billion in cryptocurrency stolen! Here’s how North Korea circumvents UN sanctions.

Member countries of the international monitoring group MSMT have concluded that North Korea is increasing its use of cybercrime and the remote work of...
Redazione RHC - 27/10/2025 - 09:28

CoPhish is coming! Microsoft Copilot Studio used to steal accounts

Attackers are using an advanced phishing technique, known as CoPhish, that leverages Microsoft Copilot Studio to trick users into granting unauthorize...
Redazione RHC - 27/10/2025 - 07:24

Anatomy of a Data Theft: Technical Analysis of the “Formbook” Infostealer

In the cyber threat landscape, few malware programs are as persistent and widespread as Formbook . What began as a simple keylogger and form grabber h...
Redazione RHC - 27/10/2025 - 07:03
1 16 17 18 19 20 224

Australia: Microsoft accused of deceptive practices in Microsoft 365 renewals

- October 27th, 2025

Australia's competition watchdog, the ACCC, said subscribers to Microsoft 365 Personal and Family plans were being asked to pay higher prices for Copilot or cancel their subscriptions. According to the...

Facebook Linkedin X

Criminal Hackers Breach US Nuclear Weapons Production Facilities

- October 27th, 2025

Government hackers breached a nuclear weapons component manufacturing facility in the United States by exploiting vulnerabilities in Microsoft SharePoint. The incident affected the Kansas City National Security Campus (KCNSC) ,...

Facebook Linkedin X

The secret behind Space Invaders’ speed? A technical limitation of the hardware

- October 27th, 2025

In 1978, Taito's Space Invaders captivated audiences with its seemingly ingenious gameplay: the more aliens you shot down, the faster the remaining ones moved. A crescendo of tension that marked...

Facebook Linkedin X

$2.8 billion in cryptocurrency stolen! Here’s how North Korea circumvents UN sanctions.

- October 27th, 2025

Member countries of the international monitoring group MSMT have concluded that North Korea is increasing its use of cybercrime and the remote work of its citizens abroad to circumvent international...

Facebook Linkedin X

CoPhish is coming! Microsoft Copilot Studio used to steal accounts

- October 27th, 2025

Attackers are using an advanced phishing technique, known as CoPhish, that leverages Microsoft Copilot Studio to trick users into granting unauthorized access to their Microsoft Sign In ID accounts. A...

Facebook Linkedin X

Anatomy of a Data Theft: Technical Analysis of the “Formbook” Infostealer

- October 27th, 2025

In the cyber threat landscape, few malware programs are as persistent and widespread as Formbook . What began as a simple keylogger and form grabber has evolved into a powerful...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE