Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Ancharia Mobile 1
Banner Ancharia Desktop 1 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

The Birth of World Wide Web: How Tim Berners-Lee Created the First Website Culture

The Birth of World Wide Web: How Tim Berners-Lee Created the First Website

There you have it! On December 20, 1990, something epochal happened at CERN in Geneva. Tim Berners-Lee , a British...
Redazione RHC - 20 December 2025
WatchGuard Firewall Zero-Day Vulnerability CVE-2025-14733 Exploited Cybercrime

WatchGuard Firewall Zero-Day Vulnerability CVE-2025-14733 Exploited

A critical zero-day vulnerability, identified as CVE-2025-14733, has left network administrators on their knees, forcing them into a race against...
Redazione RHC - 19 December 2025
Linux Kernel CVE-2025-68260 Vulnerability Fixed: Rust Code at Risk Vulnerability

Linux Kernel CVE-2025-68260 Vulnerability Fixed: Rust Code at Risk

The world of technology is a veritable battlefield, where coding geniuses challenge malicious attackers every day with exploits and security...
Redazione RHC - 19 December 2025
Google and Apple Embrace Interoperability with Android iOS Data Transfer Cybercrime

Google and Apple Embrace Interoperability with Android iOS Data Transfer

Users looking to switch from an iOS to Android ecosystem or vice versa often face less of a challenge than...
Redazione RHC - 19 December 2025
Ink Dragon Targets Europe: Exploiting SharePoint and IIS Vulnerabilities Cybercrime

Ink Dragon Targets Europe: Exploiting SharePoint and IIS Vulnerabilities

This news comes to us from Recorded Future (Insikt Group) News & Research feed: Check Point Research has documented a...
Sandro Sana - 19 December 2025
Bypassing AI Safety: EchoGram Exposes Vulnerabilities in LLM Defenses Cybercrime

Bypassing AI Safety: EchoGram Exposes Vulnerabilities in LLM Defenses

Large language models are typically released with security constraints : separate AIs from the main LLM ensure that malicious suggestions...
Redazione RHC - 19 December 2025

Passwordless Authentication: The Future of Secure Online Access

Using passwords to access online accounts is no longer as secure as it once was. In fact, passwords are now one of the most common vulnerabilities used by cybercriminals to...
Share on Facebook Share on LinkedIn Share on X

Critical PromptPwnd Vulnerability Exposes AI-Powered GitLab, GitHub Pipelines

A critical vulnerability, identified as "PromptPwnd," affects AI agents that are integrated into the GitLab CI/CD and GitHub Actions pipelines. Through this vulnerability, attackers are able to inject malicious commands...
Share on Facebook Share on LinkedIn Share on X

LLM-Powered Malware: The Future of Autonomous Cyber Threats

Researchers at Netskope Threat Labs have just published a new analysis on the possibility of creating autonomous malware built exclusively from Large Language Models (LLMs), eliminating the need to encode...
Share on Facebook Share on LinkedIn Share on X

Intellexa Exploits Zero-Day Vulnerabilities with Spyware

Despite significant geopolitical challenges, the mercenary spyware industry remains a resilient and persistent threat; in this context, the well-known vendor Intellexa continues to expand its arsenal. A recent report from...
Share on Facebook Share on LinkedIn Share on X

Malaysia Cracks Down on Bitcoin Mining Thefts

Thieves usually target tangible assets: cash or non-cash, jewelry, cars. But with cryptocurrencies, things are much stranger. Malaysian police are hunting down around 14,000 illegal Bitcoin mining companies that have...
Share on Facebook Share on LinkedIn Share on X

Australia Bans Social Media for Under 16s: What You Need to Know

Australia is soon to introduce groundbreaking legislation banning social media access for children under 16, an initiative that will set a precedent worldwide. A similar measure will soon be adopted...
Share on Facebook Share on LinkedIn Share on X

Palo Alto Networks VPN Vulnerability Exploited by Hackers

An increasingly aggressive campaign, directly targeting remote access infrastructure, has prompted threat actors to actively attempt to exploit vulnerabilities in Palo Alto Networks' GlobalProtect VPN portals . On December 5,...
Share on Facebook Share on LinkedIn Share on X

US Brothers Accused of Destroying 96 Databases with AI

The U.S. Department of Justice has accused twin brothers Muneeb and Sohaib Akhter of deleting 96 databases containing sensitive information, including investigative records and documents requested under the Freedom of...
Share on Facebook Share on LinkedIn Share on X

US Seizes Phishing Site Used by Myanmar Scammers to Steal Millions

The U.S. Department of Justice has announced the shutdown of a phishing website used by scammers in Myanmar to steal thousands of dollars from victims. According to the department, the...
Share on Facebook Share on LinkedIn Share on X

Digital Literacy in Schools: The Key to Unlocking Students’ Potential

According to Eurostat, in 2023 only 55% of European Union citizens aged 16 to 74 had at least basic digital skills, with strong differences between countries: values ​​ranging from around...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Internet Shutdowns Cost $19.7B in 2025, Sophisticated Censorship Rises
Redazione RHC - 11/01/2026

Imagine a situation where the internet appears to be working, but websites won’t open beyond the first screen, messaging apps are intermittent, and businesses are constantly changing. According to the authors of a recent annual…

Immagine del sitoCybercrime
Instagram Data Leak Exposes 17.5 Million Users on Dark Web
Redazione RHC - 10/01/2026

A massive digital archive containing the private information of approximately 17.5 million Instagram users appears to have fallen into the hands of cybercriminals. A few hours ago, the alarm was raised after several Reddit users…

Immagine del sitoCybercrime
Undertow Vulnerability CVE-2025-12543 Exposes Java Ecosystem to Critical Security Risks
Redazione RHC - 09/01/2026

A flaw has been discovered in the foundation of the Java web ecosystem. Undertow , the high-performance web server that powers enterprise heavyweights like WildFly and JBoss EAP , has been hit by a critical…

Immagine del sitoCybercrime
Iran Protests Escalate as Reza Pahlavi Calls for Action Against Government
Redazione RHC - 09/01/2026

Iranian protesters chanted and marched through the streets until Friday morning, following a call from exiled former Prince Reza Pahlavi to demonstrate, despite the Iranian theocracy cutting off the country from the internet and international…

Immagine del sitoCybercrime
Veeam Backup Vulnerability: Critical RCE Flaw Discovered – Update Now
Redazione RHC - 08/01/2026

Backups are generally considered the last line of defense, but this week Veeam reminded us that backup systems themselves can become entry points for attacks. The company released security updates for Backup & Replication ,…