Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Ancharia Mobile 1
Banner Desktop

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

EU’s Child Sexual Abuse Regulation: Balancing Safety and Digital Rights Culture

EU’s Child Sexual Abuse Regulation: Balancing Safety and Digital Rights

Before delving into the analysis, it is worth pointing out that this contribution is the first part of a more...
Paolo Galdieri - 1 January 2026
AI Systems Vulnerable to Attacks: Experts Warn of New Threats Culture

AI Systems Vulnerable to Attacks: Experts Warn of New Threats

At the recent Chaos Communication Congress in Germany, a new alarm was raised about the threats posed by artificial intelligence...
Redazione RHC - 1 January 2026
China Boosts AI Education with New Strategy to Prepare Students for Digital Age Cybercrime

China Boosts AI Education with New Strategy to Prepare Students for Digital Age

China's Ministry of Education has announced a structured strengthening of artificial intelligence education , differentiated according to different school levels,...
Redazione RHC - 31 December 2025
Finland Seizes Ship in Cable Damage Probe, Cites Security Threat Cybercrime

Finland Seizes Ship in Cable Damage Probe, Cites Security Threat

On Wednesday, December 31, Finnish authorities seized a cargo ship believed to be involved in the damage to an undersea...
Redazione RHC - 31 December 2025
Windows X-Lite 11: Optimize Your Old PC with This Lightweight Version Cybercrime

Windows X-Lite 11: Optimize Your Old PC with This Lightweight Version

On December 31st, for gamers and older computer users looking for maximum performance, the official version of Windows 11 often...
Redazione RHC - 31 December 2025
Crypto Malware Hacker Extradited to Korea for $1.18M Theft Cybercrime

Crypto Malware Hacker Extradited to Korea for $1.18M Theft

A hacker who stole over 1.7 billion won (about $1.18 million) in cryptocurrency using malware that secretly spoofed wallet addresses...
Redazione RHC - 31 December 2025

Google Chrome Security Update Fixes Critical Vulnerabilities

A significant security update has been released by Google for the stable desktop channel, which addresses two very serious vulnerabilities that could expose users to potential memory leak attacks. As...
Share on Facebook Share on LinkedIn Share on X

Spiderman Phishing Kit Targets European Banks and Crypto Users

Varonis researchers have discovered a new PhaaS platform, called Spiderman, that targets users of European banks and cryptocurrency services. Attackers use the service to create copies of legitimate websites to...
Share on Facebook Share on LinkedIn Share on X

AI Smart Glasses for Police: Efficient Vehicle Checks in China

The Changsha traffic police have begun using AI-powered smart glasses in their daily patrols. This was confirmed by the city's Public Security Bureau , which has already distributed the new...
Share on Facebook Share on LinkedIn Share on X

Notepad++ 8.8.9 Released: Fixing Critical Update Vulnerability

A new version, 8.8.9, of the popular text editor Notepad++, has been released by its developers, fixing a flaw in the automatic update system . This issue came to light...
Share on Facebook Share on LinkedIn Share on X

Salt Typhoon Hackers Exposed: Cisco Training Led to Global Telecom Breaches

A recent study by SentinelLabs sheds new light on the roots of the hacker group known as “Salt Typhoon ,” which carried out one of the most audacious espionage operations...
Share on Facebook Share on LinkedIn Share on X

Critical Red Hat OpenShift GitOps Vulnerability Exposed

A critical flaw has been discovered in Red Hat OpenShift GitOps, putting Kubernetes clusters at risk by allowing users with reduced permissions to gain full control of them. OpenShift GitOps...
Share on Facebook Share on LinkedIn Share on X

FortiGate Vulnerability Exploited: Update Now to Prevent SSO Attacks

Threat actors began actively exploiting the high-severity vulnerabilities shortly after the vendor disclosed them to bypass authentication on FortiGate devices. A recent report from Arctic Wolf reveals that, as of...
Share on Facebook Share on LinkedIn Share on X

Shannon: Autonomous Penetration Testing with AI

Shannon acts as a penetration tester who doesn't just report vulnerabilities, but launches actual exploits. Shannon's goal is to breach your web application's security before anyone with malicious intent can....
Share on Facebook Share on LinkedIn Share on X

Protecting Loved Ones from Scams and Financial Abuse

Hi guys,My name is Giorgio , I'm 58 years old, I've always worked as an administrative technician, and in life, I've always been the " rational " one in the...
Share on Facebook Share on LinkedIn Share on X

Critical Windows Vulnerability CVE-2025-59230 Exposed

Windows services dedicated to remote connections have always been an inexhaustible source of "satisfaction" for those involved in cybersecurity, revealing vulnerabilities of enormous impact. Among the most famous examples is...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoinnovation
NexPhone: Three operating systems in your pocket! The phone that challenges the very concept of a PC.
Redazione RHC - 23/01/2026

The question has been circulating for over ten years: can a smartphone really replace a computer? Over time, the industry has repeatedly attempted to provide a concrete answer, without ever reaching a definitive solution. From…

Immagine del sitoCybercrime
BlueNoroff: The Hacker Group Revolutionizing Cybercrime
Redazione RHC - 23/01/2026

The BlueNoroff hacker group has long since transformed cybercrime into a high-tech business, with tens of millions of dollars, cryptocurrency assets, and entire financial ecosystems at stake. A report by Picus Security details the group’s…

Immagine del sitoCybercrime
Nearly 2,000 bugs in 100 dating apps: How your data can be stolen
Redazione RHC - 23/01/2026

A study of 100 dating apps revealed a disturbing picture: nearly 2,000 vulnerabilities were detected, 17% of which were classified as critical. The analysis was conducted by AppSec Solutions. The study’s results were published by…

Immagine del sitoCybercrime
MacSync: The macOS malware that empties your wallet… after weeks
Redazione RHC - 23/01/2026

A new malware campaign has emerged in the macOS world, one that relies not on sophisticated exploits, but on good old-fashioned social engineering. It’s powered by the MacSync malware, distributed using the ” malware-as-a-service ”…

Immagine del sitoCybercrime
Larva-25012 Proxyjacking Campaign Targets South Korea with Notepad++ Malware
Redazione RHC - 22/01/2026

A sophisticated proxyjacking campaign is targeting systems in South Korea, attributed to the actor Larva-25012 , which distributes proxyware disguised as legitimate Notepad++ installers. The campaign demonstrates significant technical evolution, using process injection in explorer.exe…