Welcome to Red Hot Cyber | Cybersecurity News
Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Ransomfeed 320x100 1
Redhotcyber Banner Sito 970x120px Uscita 101125

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
KrakenBite Phishing Service Exposed
Di Redazione RHC - 01/12/2025

The underground cybercrime market continues to evolve rapidly, fueled by specialized groups designing and selling tools for increasingly sophisticated digital scams. Among these, a particularly active...

Immagine del sito
ADC Aerospace Hit by Play Ransomware Attack, Data Breach Feared
Di Redazione RHC - 01/12/2025

American aviation and defense components manufacturer ADC Aerospace has found itself in the spotlight due to a possible cyber attack by the Play ransomware group, which appeared on their blog where cr...

Immagine del sito
Microsoft 365 Security Risk: Interface Poisoning Attacks
Di Massimiliano Dal Cero - 01/12/2025

This article analyzes the disclosure submitted to Microsoft and available in English on digitaldefense , where images, demonstration videos and a Python code example are available. In recent years, di...

Immagine del sito
Airbus A320 Recall Due to ELAC System Failure Caused by Solar Flares
Di Redazione RHC - 01/12/2025

Airbus has announced the recall of approximately 6,500 A320 aircraft due to potential failures in the ELAC control system caused by powerful solar flares. The recall followed a sudden loss of altitude...

Immagine del sito
Leonardo’s Michelangelo Dome: AI-Powered Defense Against Hypersonic Threats
Di Redazione RHC - 30/11/2025

Italian defense company Leonardo has unveiled its new Michelangelo Dome system . According to the company, it is designed to counter hypersonic missiles and mass drone attacks . During the technical p...

TIM and Poste Italiane launch the sovereign cloud: the birth of the Italian-made AI and innovation hub

It was time for Italy to wait for a clear signal in the area of digital sovereignty. The union of two giants like TIM and Poste Italiane represents mo...
Redazione RHC - 14/11/2025 - 08:08

An “autonomous” spy campaign was orchestrated by artificial intelligence

An analysis conducted in recent months had highlighted how the evolution of artificial intelligence systems was reaching a critical point for cybersec...
Redazione RHC - 14/11/2025 - 08:01

A 0-day exploit on FortiWeb WAF is actively exploited! And remove the Admin interfaces from the Internet

Attackers are actively exploiting a critical flaw in Fortinet’s FortiWeb web application protection (WAF) system, which could be used as a means to co...
Redazione RHC - 14/11/2025 - 07:30

VLC and its creator receive award for choosing freedom over millions of dollars

Whenever you come across an unknown media file or a strange link that won't open with any standard application, there's always one program that comes ...
Redazione RHC - 13/11/2025 - 21:45

What is Misevolution: The Autonomous Evolution of AI Agents, and It’s Not Always Good

Shanghai, November 11, 2025 – A new study conducted by the Shanghai Artificial Intelligence Laboratory , in collaboration with Shanghai Jiao Tong Univ...
Redazione RHC - 13/11/2025 - 21:00

Tanks are no longer needed: new wars are fought from a laptop

Author: Roberto Villani, Tanslate: Vincenzo Marcovecchio Why will the cyberg wars, indeed the cyber-guerrillas, be more and more present and involv...
Roberto Villani - 13/11/2025 - 18:45
1 22 23 24 25 26 261

TIM and Poste Italiane launch the sovereign cloud: the birth of the Italian-made AI and innovation hub

- November 13th, 2025

It was time for Italy to wait for a clear signal in the area of digital sovereignty. The union of two giants like TIM and Poste Italiane represents more than...

Facebook Linkedin X

An “autonomous” spy campaign was orchestrated by artificial intelligence

- November 13th, 2025

An analysis conducted in recent months had highlighted how the evolution of artificial intelligence systems was reaching a critical point for cybersecurity, with capabilities doubling in just six months ....

Facebook Linkedin X

A 0-day exploit on FortiWeb WAF is actively exploited! And remove the Admin interfaces from the Internet

- November 13th, 2025

Attackers are actively exploiting a critical flaw in Fortinet’s FortiWeb web application protection (WAF) system, which could be used as a means to conduct zero-day attacks without prior detection. As...

Facebook Linkedin X

VLC and its creator receive award for choosing freedom over millions of dollars

- November 12th, 2025

Whenever you come across an unknown media file or a strange link that won't open with any standard application, there's always one program that comes to the rescue: VLC ....

Facebook Linkedin X

What is Misevolution: The Autonomous Evolution of AI Agents, and It’s Not Always Good

- November 12th, 2025

Shanghai, November 11, 2025 – A new study conducted by the Shanghai Artificial Intelligence Laboratory , in collaboration with Shanghai Jiao Tong University , Renmin University of China , and...

Facebook Linkedin X

Tanks are no longer needed: new wars are fought from a laptop

- November 12th, 2025

Author: Roberto Villani, Tanslate: Vincenzo Marcovecchio Why will the cyberg wars, indeed the cyber-guerrillas, be more and more present and involve us more and more? The short century, the 1900s...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE