Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
2nd Edition GlitchZone RHC 320x100 2
Banner Ransomfeed 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Meta AI WhatsApp Investigation Cybercrime

Meta AI WhatsApp Investigation

Nine months after its implementation in Europe, Meta’s conversational artificial intelligence (AI) tool, integrated directly into WhatsApp, will be investigated...
Redazione RHC - 5 December 2025
Gulf States’ Digital Transformation: A New Era of Innovation and Security Cybercrime

Gulf States’ Digital Transformation: A New Era of Innovation and Security

It is a time of great geopolitical changes in the Gulf. It has been evident for some time that the...
Matteo Giada - 5 December 2025
Neurodivergence in Cybersecurity: A Hidden Competitive Advantage Cybercrime

Neurodivergence in Cybersecurity: A Hidden Competitive Advantage

Personal growth manuals sell hyperfocus as the secret to success. Routines as the key to productivity. Stepping out of your...
Fabrizio Saviano - 5 December 2025
Leroy Merlin Cyberattack Exposes Personal Data of French Customers Cybercrime

Leroy Merlin Cyberattack Exposes Personal Data of French Customers

A cyberattack has affected Leroy Merlin, involving the personal data of numerous customers in France, impacting hundreds of thousands of...
Redazione RHC - 4 December 2025
Anonymity for Sale: Russian SIM Card Market Thrives Amid Regulations Cybercrime

Anonymity for Sale: Russian SIM Card Market Thrives Amid Regulations

Efforts by legislators and law enforcement to combat money laundering and more complex SIM card verification procedures have not significantly...
Redazione RHC - 4 December 2025
Hackers Compromise 120k IP Cameras for Pornographic Videos Cybercrime

Hackers Compromise 120k IP Cameras for Pornographic Videos

South Korean police have reported the arrest of four individuals who, presumably independently, compromised over 120,000 IP cameras. According to...
Redazione RHC - 4 December 2025

Critical vulnerability in the WordPress plugin W3 Total Cache. 430,000 sites at risk!

A critical vulnerability, CVE-2025-9501, has been discovered in the popular WordPress plugin W3 Total Cache . This vulnerability allows the execution of arbitrary PHP commands on the server without authentication....
Share on Facebook Share on LinkedIn Share on X

Hundreds of robots on the march: China presents the new generation of humanoids

Shenzhen -based UBTECH Robotics has publicly demonstrated its new wave of humanoid robots, delivering several hundred of them in a single shipment. The announcement was accompanied by a video that...
Share on Facebook Share on LinkedIn Share on X

Veeam launches Data Platform v13, redefining the standard for cyber resilience and advanced data protection.

With new capabilities to stay ahead of threats and accelerate recovery with next-generation security, forensic insights and intelligent automation, Veeam also launches the Universal Hypervisor Integration API, a flexible integration...
Share on Facebook Share on LinkedIn Share on X

Happy birthday, Windows! 40 years of operating system history and still going strong.

Exactly 40 years ago, on November 20, 1985, Microsoft released Windows 1.0 , the first version of Windows, which attempted to transform the then-personal computer from a machine with a...
Share on Facebook Share on LinkedIn Share on X

World Children’s Day: Children live in digital, but digital wasn’t designed for them.

Today is World Children's Day, established by the UN on November 20 to commemorate two fundamental acts: the 1959 Declaration of the Rights of the Child and, thirty years later,...
Share on Facebook Share on LinkedIn Share on X

Huawei unveils HarmonyOS and the new HM740 laptop. Is Microsoft Office at risk?

On November 19, Huawei presented the latest developments in its HarmonyOS line for the office sector during a technical meeting with institutional partners and enterprises. The company confirmed that HarmonyOS-based...
Share on Facebook Share on LinkedIn Share on X

Meta and Google suspend construction of two undersea cables due to instability in the Red Sea

Meta and Google have been forced to postpone several major undersea internet cable projects, including 2Africa and Blue-Raman , in the Red Sea corridor through which 20 percent of global...
Share on Facebook Share on LinkedIn Share on X

Let the hunt begin! Critical 7-Zip bug puts millions of users at risk.

Millions of users are exposed to the risk of malware infections and system compromise due to hackers' active exploitation of a critical remote code execution (RCE) vulnerability in the popular...
Share on Facebook Share on LinkedIn Share on X

Python to Rust: A More Secure Future for the Programming Language

Two CPython developers have proposed adding the Rust programming language to the Python codebase . Emma Smith and a colleague have published a Preliminary Python Enhancement Proposal (Pre-PEP) justifying this...
Share on Facebook Share on LinkedIn Share on X

Multi-threaded Hacking: US Pioneers Automated Operations with AI Agents

In recent months, a new cyber operations infrastructure has been developing in the United States, in which automated agents are becoming not just a support tool, but a full-fledged participant...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Browser-in-the-Browser Phishing Attack: How to Protect Yourself
Manuel Roccon - 29/12/2025

This article analyzes a recent and sophisticated phishing campaign that uses the Browser-in-the-Browser (BitB) technique to steal credentials, particularly those from services like Microsoft 365. The BitB attack is notable for its ability to generate…

Immagine del sitoCybercrime
Critical WebKit Vulnerability Exposes iOS Devices to Code Execution
Redazione RHC - 29/12/2025

A new report details a critical vulnerability discovered by security researcher Joseph Goydish in Apple’s WebKit engine. This security flaw, if exploited in conjunction with other exploits, could allow attackers to execute arbitrary code on…

Immagine del sitoCybercrime
Xspeeder Devices Hit by AI-Discovered Zero-Day Vulnerability CVE-2025-54322
Redazione RHC - 29/12/2025

When it comes to cybersecurity, it’s easy to fall into the trap of thinking that problems are always far away, that they only affect others. But the reality is that a vulnerability is always around…

Immagine del sitoCybercrime
Job Scams on Social Media: How to Avoid Fake Remote Job Offers
Redazione RHC - 29/12/2025

Fraudulent job ads promising easy money and remote work continue to flood social media, particularly in the Middle East and North Africa . Under the guise of part-time jobs that require no experience , scammers…

Immagine del sitoCybercrime
Cyber Criminals Recruit Insiders: Companies at Risk of Internal Threats
Redazione RHC - 27/12/2025

The cybercriminal community is rapidly increasing its interest in recruiting personnel from within companies . Instead of sophisticated external attacks, criminals are increasingly relying on internal sources— people willing to provide access to company systems…