Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Fortinet 320x100px
HackTheBox 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Bypassing AI Safety: EchoGram Exposes Vulnerabilities in LLM Defenses Cybercrime

Bypassing AI Safety: EchoGram Exposes Vulnerabilities in LLM Defenses

Large language models are typically released with security constraints : separate AIs from the main LLM ensure that malicious suggestions...
Redazione RHC - 19 December 2025
E-Note Shutdown: Major Blow to Cybercrime and Ransomware Cybercrime

E-Note Shutdown: Major Blow to Cybercrime and Ransomware

When we talk about cybercrime, we often think of something far away, something that doesn't concern us. But the truth...
Redazione RHC - 19 December 2025
French Police Arrest Suspect in Cyberattack on Interior Ministry Cybercrime

French Police Arrest Suspect in Cyberattack on Interior Ministry

French law enforcement has arrested a 22-year-old man suspected of carrying out a recent cyberattack on the Ministry of the...
Redazione RHC - 18 December 2025
Google Unveils Gemini 3 Flash AI Model, Rivals OpenAI GPT-5.2 innovation

Google Unveils Gemini 3 Flash AI Model, Rivals OpenAI GPT-5.2

The battle for AI leadership is increasingly moving from the lab to mass production. The day after the release of...
Redazione RHC - 18 December 2025
Rise of AI Degrees: Students Shift from Computer Science to AI Cybercrime

Rise of AI Degrees: Students Shift from Computer Science to AI

A marked shift in college student preferences is taking place in the United States. More and more young people are...
Redazione RHC - 18 December 2025
SonicWall SMA1000 Vulnerability: Critical Security Patch Released Cybercrime

SonicWall SMA1000 Vulnerability: Critical Security Patch Released

Researchers have discovered a vulnerability, identified as CVE-2025-40602, affecting SonicWall's SMA1000 series of secure access gateways. This flaw is particularly...
Redazione RHC - 18 December 2025

Australia Bans Social Media for Under 16s: What You Need to Know

Australia is soon to introduce groundbreaking legislation banning social media access for children under 16, an initiative that will set a precedent worldwide. A similar measure will soon be adopted...
Share on Facebook Share on LinkedIn Share on X

Palo Alto Networks VPN Vulnerability Exploited by Hackers

An increasingly aggressive campaign, directly targeting remote access infrastructure, has prompted threat actors to actively attempt to exploit vulnerabilities in Palo Alto Networks' GlobalProtect VPN portals . On December 5,...
Share on Facebook Share on LinkedIn Share on X

US Brothers Accused of Destroying 96 Databases with AI

The U.S. Department of Justice has accused twin brothers Muneeb and Sohaib Akhter of deleting 96 databases containing sensitive information, including investigative records and documents requested under the Freedom of...
Share on Facebook Share on LinkedIn Share on X

US Seizes Phishing Site Used by Myanmar Scammers to Steal Millions

The U.S. Department of Justice has announced the shutdown of a phishing website used by scammers in Myanmar to steal thousands of dollars from victims. According to the department, the...
Share on Facebook Share on LinkedIn Share on X

Digital Literacy in Schools: The Key to Unlocking Students’ Potential

According to Eurostat, in 2023 only 55% of European Union citizens aged 16 to 74 had at least basic digital skills, with strong differences between countries: values ​​ranging from around...
Share on Facebook Share on LinkedIn Share on X

OSINT Investigation: Uncovering Digital Evidence

We live in an age of almost mandatory transparency, an age in which every single digital action we take, be it a simple tap on a screen, an online search,...
Share on Facebook Share on LinkedIn Share on X

Europe’s Digital Sovereignty: The Risks of Relying on Non-European Tech

In recent months, two seemingly unrelated events have highlighted an uncomfortable truth: Europe no longer controls its own digital infrastructure . And this dependence, in an increasingly tense geopolitical landscape,...
Share on Facebook Share on LinkedIn Share on X

Apple’s Major Shake-Up: Johny Srouji Leaves as Senior VP of Hardware Technologies

Apple is going through a period of major leadership changes , with the departure of key figures who have contributed significantly to the company's technological development. The latest executive to...
Share on Facebook Share on LinkedIn Share on X

Cloudflare Outage: 25 Minutes of Chaos Due to React Server Issue

Cloudflare experienced a significant outage on the morning of December 5, 2025, when at 8:47 a.m. UTC, a portion of its infrastructure began experiencing internal errors. The incident, which lasted...
Share on Facebook Share on LinkedIn Share on X

Microsoft CEO on AI Challenges

In a conversation with Matthias Döpfner, CEO of Axel Springer, Microsoft CEO Satya Nadella acknowledged that the Redmond-based company's impressive growth is currently a limiting factor in the competition in...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Instagram Data Leak Exposes 17.5 Million Users on Dark Web
Redazione RHC - 10/01/2026

A massive digital archive containing the private information of approximately 17.5 million Instagram users appears to have fallen into the hands of cybercriminals. A few hours ago, the alarm was raised after several Reddit users…

Immagine del sitoCybercrime
Undertow Vulnerability CVE-2025-12543 Exposes Java Ecosystem to Critical Security Risks
Redazione RHC - 09/01/2026

A flaw has been discovered in the foundation of the Java web ecosystem. Undertow , the high-performance web server that powers enterprise heavyweights like WildFly and JBoss EAP , has been hit by a critical…

Immagine del sitoCybercrime
Iran Protests Escalate as Reza Pahlavi Calls for Action Against Government
Redazione RHC - 09/01/2026

Iranian protesters chanted and marched through the streets until Friday morning, following a call from exiled former Prince Reza Pahlavi to demonstrate, despite the Iranian theocracy cutting off the country from the internet and international…

Immagine del sitoCybercrime
Veeam Backup Vulnerability: Critical RCE Flaw Discovered – Update Now
Redazione RHC - 08/01/2026

Backups are generally considered the last line of defense, but this week Veeam reminded us that backup systems themselves can become entry points for attacks. The company released security updates for Backup & Replication ,…

Immagine del sitoCybercrime
When Attack Discovery Becomes Automated, Detection Stops Scaling
Alexander Rogan - 08/01/2026

For much of the past two decades, cybersecurity has been built on a simple assumption: malicious activity can be detected, analysed, and responded to before meaningful damage occurs. This assumption shaped everything from SOC design…