Red Hot Cyber. The Cybersecurity Blog
Will this latest article “against” ChatControl be absolutely useless?
We had already discussed the proposed “ChatControl” regulation almost two years ago, but given the roadmap currently underway, we find ourselves embarrassed to have to discuss it again. It feels like ...
RHC interviews ShinyHunters: “Systems can be repaired, but people remain vulnerable!”
ShinyHunters is a group of threat actors that gained notoriety after the massive data breach against Salesforce, an incident that led Google to closely monitor them and assign them the code name UNC62...
The Great Firewall in the Spotlight: The Leak Revealing the Industrialization of Chinese Censorship
Edited by Luca Stivali and Olivia Terragni. On September 11, 2025, what can be defined as the largest leak ever suffered by the Great Firewall of China (GFW) exploded in the media, massively and massi...
OpenAI and Microsoft reach agreement to transform into a public utility company.
OpenAI has entered into a memorandum of understanding with Microsoft to review its partnership, which could lead to the company’s transformation into a Public Benefit Corporation (PBC). If the transfo...
Goodbye PowerShell 2.0 and WMIC! The great Windows 11 cleanup has begun.
Windows 11 users who have installed the September 2025 Update might think that practically nothing changes. At first glance, KB5065426 looks like a normal small patch that Microsoft distributes to eve...
Looking for Volodymyr Tymoshchuk! 11 million dollars for the Nefilim hacker
The U.S. Department of Justice has indicted Ukrainian Volodymyr Tymoshchuk on seven counts of computer hacking and extortion. He is considered one of the most dangerous hackers of recent years. The in...
In Nepal, people are dying for social media! 19 people lost their lives trying to get Facebook back
In a dramatic reversal, Nepal has lifted the nationwide social media blackout imposed last week after it sparked massive youth protests and caused at least 19 deaths, according to local media. The dec...
Xi Jinping and the Chinese APT’s Ambition
The post-COVID macro political movements, including ongoing conflicts, have prompted a majority of states to shift their medium- to long-term political objectives. Clearly, a paradigm shift has been v...
Salesloft Cyber Attack: Chatbot Drift Temporarily Disabled
Salesloft announced that it would temporarily deactivate its AI-powered chatbot Drift on September 5, after several companies were hit by a massive supply chain attack. The incident resulted in the ma...
Discover the Dark Web: Access, Secrets, and Helpful Links to the Onion Network
The Dark Web is a part of the internet that cannot be reached with standard browsers (Chrome, Firefox, Edge). To access it, you need to use specific tools like the Tor Browser, which guarantees anonym...
Featured Articles

We had already discussed the proposed “ChatControl” regulation almost two years ago, but given the roadmap currently underway, we find ourselves embarrassed to have to discuss it again. It feels l...

ShinyHunters is a group of threat actors that gained notoriety after the massive data breach against Salesforce, an incident that led Google to closely monitor them and assign them the code name UNC62...

Edited by Luca Stivali and Olivia Terragni. On September 11, 2025, what can be defined as the largest leak ever suffered by the Great Firewall of China (GFW) exploded in the media, massively and massi...

OpenAI has entered into a memorandum of understanding with Microsoft to review its partnership, which could lead to the company’s transformation into a Public Benefit Corporation (PBC). If the trans...

Windows 11 users who have installed the September 2025 Update might think that practically nothing changes. At first glance, KB5065426 looks like a normal small patch that Microsoft distributes to eve...
Hackable restaurant robots could serve sushi… at the attacker’s home.
LECS powered by Cyber Evolution: la prima black box NDR completamente Made in Italy
AI A2 detected 102 0-day bugs and created exploits in Android apps for $1.77
Figure 02, the robot that loads the dishwasher with precision
If Flash is dead, here’s the SVG Assassin! Phishing 2.0 is in high definition.
The Dark Side of Windows Drivers: How to Steal Data While Ignoring EDR

Hackable restaurant robots could serve sushi… at the attacker’s home.
Redazione RHC - September 6th, 2025
An independent security specialist, known by the nickname BobDaHacker, discovered security flaws in Pudu Robotics (the world's leading provider of commercial service robots). The vulnerabilities allowed attackers to redirect the...

LECS powered by Cyber Evolution: la prima black box NDR completamente Made in Italy
Redazione RHC - September 6th, 2025
In the current cybersecurity landscape, threats are moving ever faster and more sophisticated. Traditional defense tools are no longer sufficient to ensure complete visibility, especially when the attack leaves no...

AI A2 detected 102 0-day bugs and created exploits in Android apps for $1.77
Redazione RHC - September 6th, 2025
Artificial intelligence systems have been criticized for creating confusing vulnerability reports and inundating open-source developers with irrelevant complaints. But researchers at Nanjing University and the University of Sydney have an...

Figure 02, the robot that loads the dishwasher with precision
Redazione RHC - September 5th, 2025
California-based company Figure has unveiled another milestone for its humanoid Figure 02: the robot loaded a dishwasher with high precision using the versatile Helix model, based on the Vision-Language-Action (VLA)...

If Flash is dead, here’s the SVG Assassin! Phishing 2.0 is in high definition.
Redazione RHC - September 5th, 2025
Cybercriminals have launched a new wave of attacks using SVG files to distribute phishing pages. Experts at VirusTotal have reported that attackers are impersonating the Colombian prosecutor's office, distributing email...

The Dark Side of Windows Drivers: How to Steal Data While Ignoring EDR
Redazione RHC - September 5th, 2025
A recent study conducted by Workday's Offensive Security team highlighted a vulnerability in Windows drivers that effectively bypasses Endpoint Detection and Response (EDR) tools. This technique exploits direct disk reading,...
Sign up for the newsletter