Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Will this latest article “against” ChatControl be absolutely useless?
Di Stefano Gazzella - 18/09/2025

We had already discussed the proposed “ChatControl” regulation almost two years ago, but given the roadmap currently underway, we find ourselves embarrassed to have to discuss it again. It feels l...

RHC interviews ShinyHunters: “Systems can be repaired, but people remain vulnerable!”
Di RHC Dark Lab - 17/09/2025

ShinyHunters is a group of threat actors that gained notoriety after the massive data breach against Salesforce, an incident that led Google to closely monitor them and assign them the code name UNC62...

The Great Firewall in the Spotlight: The Leak Revealing the Industrialization of Chinese Censorship
Di Redazione RHC - 16/09/2025

Edited by Luca Stivali and Olivia Terragni. On September 11, 2025, what can be defined as the largest leak ever suffered by the Great Firewall of China (GFW) exploded in the media, massively and massi...

OpenAI and Microsoft reach agreement to transform into a public utility company.
Di Redazione RHC - 13/09/2025

OpenAI has entered into a memorandum of understanding with Microsoft to review its partnership, which could lead to the company’s transformation into a Public Benefit Corporation (PBC). If the trans...

Goodbye PowerShell 2.0 and WMIC! The great Windows 11 cleanup has begun.
Di Redazione RHC - 12/09/2025

Windows 11 users who have installed the September 2025 Update might think that practically nothing changes. At first glance, KB5065426 looks like a normal small patch that Microsoft distributes to eve...

Hackable restaurant robots could serve sushi… at the attacker’s home.

An independent security specialist, known by the nickname BobDaHacker, discovered security flaws in Pudu Robotics (the world's leading provider of com...
Redazione RHC - 06/09/2025 - 09:20

LECS powered by Cyber Evolution: la prima black box NDR completamente Made in Italy

In the current cybersecurity landscape, threats are moving ever faster and more sophisticated. Traditional defense tools are no longer sufficient to e...
Redazione RHC - 06/09/2025 - 09:12

AI A2 detected 102 0-day bugs and created exploits in Android apps for $1.77

Artificial intelligence systems have been criticized for creating confusing vulnerability reports and inundating open-source developers with irrelevan...
Redazione RHC - 06/09/2025 - 09:12

Figure 02, the robot that loads the dishwasher with precision

California-based company Figure has unveiled another milestone for its humanoid Figure 02: the robot loaded a dishwasher with high precision using the...
Redazione RHC - 05/09/2025 - 20:25

If Flash is dead, here’s the SVG Assassin! Phishing 2.0 is in high definition.

Cybercriminals have launched a new wave of attacks using SVG files to distribute phishing pages. Experts at VirusTotal have reported that attackers ar...
Redazione RHC - 05/09/2025 - 17:33

The Dark Side of Windows Drivers: How to Steal Data While Ignoring EDR

A recent study conducted by Workday's Offensive Security team highlighted a vulnerability in Windows drivers that effectively bypasses Endpoint Detect...
Redazione RHC - 05/09/2025 - 16:59
1 19 20 21 22 23 148

Hackable restaurant robots could serve sushi… at the attacker’s home.

- September 6th, 2025

An independent security specialist, known by the nickname BobDaHacker, discovered security flaws in Pudu Robotics (the world's leading provider of commercial service robots). The vulnerabilities allowed attackers to redirect the...

  

LECS powered by Cyber Evolution: la prima black box NDR completamente Made in Italy

- September 6th, 2025

In the current cybersecurity landscape, threats are moving ever faster and more sophisticated. Traditional defense tools are no longer sufficient to ensure complete visibility, especially when the attack leaves no...

  

AI A2 detected 102 0-day bugs and created exploits in Android apps for $1.77

- September 6th, 2025

Artificial intelligence systems have been criticized for creating confusing vulnerability reports and inundating open-source developers with irrelevant complaints. But researchers at Nanjing University and the University of Sydney have an...

  

Figure 02, the robot that loads the dishwasher with precision

- September 5th, 2025

California-based company Figure has unveiled another milestone for its humanoid Figure 02: the robot loaded a dishwasher with high precision using the versatile Helix model, based on the Vision-Language-Action (VLA)...

  

If Flash is dead, here’s the SVG Assassin! Phishing 2.0 is in high definition.

- September 5th, 2025

Cybercriminals have launched a new wave of attacks using SVG files to distribute phishing pages. Experts at VirusTotal have reported that attackers are impersonating the Colombian prosecutor's office, distributing email...

  

The Dark Side of Windows Drivers: How to Steal Data While Ignoring EDR

- September 5th, 2025

A recent study conducted by Workday's Offensive Security team highlighted a vulnerability in Windows drivers that effectively bypasses Endpoint Detection and Response (EDR) tools. This technique exploits direct disk reading,...

  

Sign up for the newsletter