Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Ancharia Mobile 1
HackTheBox 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Top 25 Software Vulnerabilities 2025: MITRE CWE Ranking and Security Tips Cybercrime

Top 25 Software Vulnerabilities 2025: MITRE CWE Ranking and Security Tips

MITRE has released its ranking of the 25 most dangerous software vulnerabilities predicted for 2025, based on data collected through...
Redazione RHC - 13 December 2025
The Future of Work: 4-Day Week with AI and Tech Advances innovation

The Future of Work: 4-Day Week with AI and Tech Advances

The prospect of a four-day workweek, with a resulting three-day long weekend, may not be far off. This is according...
Redazione RHC - 13 December 2025
ARTEMIS Leads in AI-Powered Pentesting, Outperforming Human Experts Hacking

ARTEMIS Leads in AI-Powered Pentesting, Outperforming Human Experts

Stanford researchers and their colleagues conducted an unusual experiment: they compared the performance of ten professional specialists and a set...
Redazione RHC - 13 December 2025
Apple Patches Critical WebKit Vulnerabilities in iOS Update Vulnerability

Apple Patches Critical WebKit Vulnerabilities in iOS Update

Following the discovery of two critical zero-day vulnerabilities in the WebKit browser engine, Apple has urgently released security updates for...
Redazione RHC - 13 December 2025
Kali Linux 2025.4: Discover the Power of Wayland and Enhanced Security Tools Cybercrime

Kali Linux 2025.4: Discover the Power of Wayland and Enhanced Security Tools

The recent 2025.4 release of Kali Linux has been made available to the public, introducing significant improvements to the GNOME,...
Redazione RHC - 12 December 2025
French Interior Ministry Hit by Cyberattack, Data Security at Risk Cybercrime

French Interior Ministry Hit by Cyberattack, Data Security at Risk

The French Ministry of the Interior's email servers were targeted by a cyberattack. The hacker managed to access "several files,"...
Redazione RHC - 12 December 2025

Human Washing Machine Launched: Japan’s Science Unveils Unique Device

Japanese company Science has launched a washing machine for humans. The 2.30-meter-long capsule bathes a person in 15 minutes and attracted considerable interest at the recently concluded Osaka Expo. The...
Share on Facebook Share on LinkedIn Share on X

Brazilian Systems Targeted in Sophisticated OAST Exploit Campaign

Security researchers have discovered a sophisticated exploit campaign that leverages a private out-of-band application security testing (OAST) service hosted on Google Cloud infrastructure. The campaign primarily targets systems in Brazil...
Share on Facebook Share on LinkedIn Share on X

Australian Man Jailed for Evil Twin Wi-Fi Scam Targeting Airline Passengers

An Australian court has convicted a 44-year-old man who stole the personal data of airline passengers and airport visitors over several months . He was sentenced to seven years and...
Share on Facebook Share on LinkedIn Share on X

KrakenBite Phishing Service Exposed

The underground cybercrime market continues to evolve rapidly, fueled by specialized groups designing and selling tools for increasingly sophisticated digital scams. Among these, a particularly active player in recent weeks...
Share on Facebook Share on LinkedIn Share on X

ADC Aerospace Hit by Play Ransomware Attack, Data Breach Feared

American aviation and defense components manufacturer ADC Aerospace has found itself in the spotlight due to a possible cyber attack by the Play ransomware group, which appeared on their blog...
Share on Facebook Share on LinkedIn Share on X

Microsoft 365 Security Risk: Interface Poisoning Attacks

This article analyzes the disclosure submitted to Microsoft and available in English on digitaldefense , where images, demonstration videos and a Python code example are available. In recent years, digital...
Share on Facebook Share on LinkedIn Share on X

Calendar Subscriptions: A Hidden Danger in Your Digital Life

Digital calendars have long been a convenient way to keep track of daily activities, but new research from Bitsight shows that this familiar tool can become a real attack channel....
Share on Facebook Share on LinkedIn Share on X

Airbus A320 Recall Due to ELAC System Failure Caused by Solar Flares

Airbus has announced the recall of approximately 6,500 A320 aircraft due to potential failures in the ELAC control system caused by powerful solar flares. The recall followed a sudden loss...
Share on Facebook Share on LinkedIn Share on X

OpenAI Faces Fierce Competition from Google’s Gemini 3

OpenAI, a company valued at around $500 billion, is facing increasingly fierce technical competition . Google's latest version of Gemini 3 , in particular, outperforms OpenAI's GPT-5 in several areas....
Share on Facebook Share on LinkedIn Share on X

Leonardo’s Michelangelo Dome: AI-Powered Defense Against Hypersonic Threats

Italian defense company Leonardo has unveiled its new Michelangelo Dome system . According to the company, it is designed to counter hypersonic missiles and mass drone attacks . During the...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Instagram Data Leak Exposes 17.5 Million Users on Dark Web
Redazione RHC - 10/01/2026

A massive digital archive containing the private information of approximately 17.5 million Instagram users appears to have fallen into the hands of cybercriminals. A few hours ago, the alarm was raised after several Reddit users…

Immagine del sitoCybercrime
Undertow Vulnerability CVE-2025-12543 Exposes Java Ecosystem to Critical Security Risks
Redazione RHC - 09/01/2026

A flaw has been discovered in the foundation of the Java web ecosystem. Undertow , the high-performance web server that powers enterprise heavyweights like WildFly and JBoss EAP , has been hit by a critical…

Immagine del sitoCybercrime
Iran Protests Escalate as Reza Pahlavi Calls for Action Against Government
Redazione RHC - 09/01/2026

Iranian protesters chanted and marched through the streets until Friday morning, following a call from exiled former Prince Reza Pahlavi to demonstrate, despite the Iranian theocracy cutting off the country from the internet and international…

Immagine del sitoCybercrime
Veeam Backup Vulnerability: Critical RCE Flaw Discovered – Update Now
Redazione RHC - 08/01/2026

Backups are generally considered the last line of defense, but this week Veeam reminded us that backup systems themselves can become entry points for attacks. The company released security updates for Backup & Replication ,…

Immagine del sitoCybercrime
When Attack Discovery Becomes Automated, Detection Stops Scaling
Alexander Rogan - 08/01/2026

For much of the past two decades, cybersecurity has been built on a simple assumption: malicious activity can be detected, analysed, and responded to before meaningful damage occurs. This assumption shaped everything from SOC design…