Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Enterprise BusinessLog 320x200 1
Banner Ransomfeed 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Google Chrome 143 Patch Fixes Critical V8 JavaScript Vulnerability Vulnerability

Google Chrome 143 Patch Fixes Critical V8 JavaScript Vulnerability

Google has released Chrome 143 for Windows, macOS, and Linux; the release contains an important patch. The new version (...
Redazione RHC - 3 December 2025
Cybersecurity in December: How Compliance Hurries Leave Companies Vulnerable Cybercrime

Cybersecurity in December: How Compliance Hurries Leave Companies Vulnerable

December isn't just about Christmas lights: for those working in cybersecurity, it's the month when the human factor collapses and...
Ambra Santoro - 3 December 2025
Managing AI Agents: Mitigating Security Risks in Autonomous Systems innovation

Managing AI Agents: Mitigating Security Risks in Autonomous Systems

The widespread adoption of artificial intelligence in businesses is profoundly transforming operational processes and, at the same time, introducing new...
Redazione RHC - 3 December 2025
Mistral AI Unveils Powerful Open Source Models for Advanced AI Applications Cybercrime

Mistral AI Unveils Powerful Open Source Models for Advanced AI Applications

French company Mistral AI has unveiled its Mistral 3 line of models, making them fully open source under the Apache...
Redazione RHC - 3 December 2025
Maha Grass APT Group Unleashes StreamSpy Malware Attacks Cybercrime

Maha Grass APT Group Unleashes StreamSpy Malware Attacks

The Patchwork cyber espionage group — also known as Hangover or Dropping Elephant and internally tracked by QiAnXin as APT-Q-36...
Redazione RHC - 3 December 2025
Digital Crime Among Teenagers: Temporary Involvement Cybercrime

Digital Crime Among Teenagers: Temporary Involvement

Dutch authorities have published data showing that adolescents' involvement in cybercrime is usually temporary. An analysis prepared by the House...
Redazione RHC - 2 December 2025

From Likes to Depression: How Social Media Can Affect Our Mental Health

Questioning changes as they occur is always a difficult, if not downright foolhardy, undertaking. Certainly, when the object of the investigation concerns the changes social media has wrought on individuals,...
Share on Facebook Share on LinkedIn Share on X

The US and Global Surveillance: Uncovering Section 702 of the Foreign Intelligence Surveillance Act

Privacy in the United States is a constant topic of debate, especially in the digital age. The Supreme Court has played a central role in interpreting the Fourth Amendment, which...
Share on Facebook Share on LinkedIn Share on X

What is Cross-Site Scripting? An article to help you understand it in a simple way.

Author : Davide Cavallini Today I will try to use the same dialectic ( as previously done in the article on SQL injection ), and explain in a simple way...
Share on Facebook Share on LinkedIn Share on X

Spy Apps: How Spyware Works and Why It’s a Privacy Risk

Spyware (also known as spy apps) represent one of the most insidious and dangerous threats of the digital age. These are malicious programs designed to infiltrate a user's device, collecting...
Share on Facebook Share on LinkedIn Share on X

Asus releases emergency firmware update for vulnerable DSL routers.

Asus has released an emergency firmware update for several DSL router models. The patch addresses a critical vulnerability that allows attackers to take complete control of devices without authentication. The...
Share on Facebook Share on LinkedIn Share on X

Nuclear power entirely in the hands of AI! And what if there’s an accident?

In the technological field, the idea that the future development of generating systems depends inexorably on the expansion of nuclear capacity is taking root, pushing the sector's players to identify...
Share on Facebook Share on LinkedIn Share on X

Veeam Analysis: Ransomware Payments Decline, But Data Resilience Remains Critical for EMEA Enterprises

Beyond backup: Businesses need cyber resilience, data portability, secure cloud storage, and hybrid cloud protection . Data from the Veeam Ransomware Trends Reports 2024 and 2025 shows that the number...
Share on Facebook Share on LinkedIn Share on X

The History of GPS: The History of Satellite Navigation

It's amazing how far we've come with satellite navigation in the last 40 years. GPS (Global Positioning System) is one of the most useful things to have ever come out...
Share on Facebook Share on LinkedIn Share on X

Tor Browser 15.0.1: Critical Vulnerability Fixes and Improvements

The Tor Project has released Tor Browser 15.0.1 , fixing critical security vulnerabilities inherited from Firefox 140.5.0esr. This maintenance release offers essential protections for privacy-conscious users who rely on anonymous...
Share on Facebook Share on LinkedIn Share on X

16 Years of Go: An Innovative and Scalable Programming Language

In November 2025, the Go programming language turned 16 years old. It was released publicly on November 10, 2009 , as a Google experiment to create a simple and fast...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Villager Framework: AI-Powered Penetration Testing Tool
Redazione RHC - 26/12/2025

Straiker’s AI Research (STAR) team has identified Villager, a native AI-based penetration testing framework developed by the Chinese group Cyberspike . The tool, presented as a red team solution , is designed to fully automate…

Immagine del sitoCybercrime
A $500 Tool Claims to Kill EDRs at Kernel Level: Inside the NtKiller Underground Ad
Redazione RHC - 25/12/2025

An ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…

Immagine del sitoCybercrime
Webrat Malware Targets Security Researchers with GitHub Exploit Traps
Redazione RHC - 24/12/2025

There’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…

Immagine del sitoCybercrime
A backdoor in NVIDIA code. Three 9.8 bugs plague AI and robotics development systems
Redazione RHC - 24/12/2025

When it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…

Immagine del sitoCybercrime
La Poste Hit by Pro-Russian DDoS Attack During Peak Holiday Season
Redazione RHC - 23/12/2025

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…