Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Cyber Offensive Fundamentals 320x200 V0.1
Crowdstriker 970×120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

The Birth of World Wide Web: How Tim Berners-Lee Created the First Website Culture

The Birth of World Wide Web: How Tim Berners-Lee Created the First Website

There you have it! On December 20, 1990, something epochal happened at CERN in Geneva. Tim Berners-Lee , a British...
Redazione RHC - 20 December 2025
WatchGuard Firewall Zero-Day Vulnerability CVE-2025-14733 Exploited Cybercrime

WatchGuard Firewall Zero-Day Vulnerability CVE-2025-14733 Exploited

A critical zero-day vulnerability, identified as CVE-2025-14733, has left network administrators on their knees, forcing them into a race against...
Redazione RHC - 19 December 2025
Linux Kernel CVE-2025-68260 Vulnerability Fixed: Rust Code at Risk Vulnerability

Linux Kernel CVE-2025-68260 Vulnerability Fixed: Rust Code at Risk

The world of technology is a veritable battlefield, where coding geniuses challenge malicious attackers every day with exploits and security...
Redazione RHC - 19 December 2025
Google and Apple Embrace Interoperability with Android iOS Data Transfer Cybercrime

Google and Apple Embrace Interoperability with Android iOS Data Transfer

Users looking to switch from an iOS to Android ecosystem or vice versa often face less of a challenge than...
Redazione RHC - 19 December 2025
Ink Dragon Targets Europe: Exploiting SharePoint and IIS Vulnerabilities Cybercrime

Ink Dragon Targets Europe: Exploiting SharePoint and IIS Vulnerabilities

This news comes to us from Recorded Future (Insikt Group) News & Research feed: Check Point Research has documented a...
Sandro Sana - 19 December 2025
Bypassing AI Safety: EchoGram Exposes Vulnerabilities in LLM Defenses Cybercrime

Bypassing AI Safety: EchoGram Exposes Vulnerabilities in LLM Defenses

Large language models are typically released with security constraints : separate AIs from the main LLM ensure that malicious suggestions...
Redazione RHC - 19 December 2025

Meta AI WhatsApp Investigation

Nine months after its implementation in Europe, Meta’s conversational artificial intelligence (AI) tool, integrated directly into WhatsApp, will be investigated by the European Commission . Two officials from the Brussels...
Share on Facebook Share on LinkedIn Share on X

Gulf States’ Digital Transformation: A New Era of Innovation and Security

It is a time of great geopolitical changes in the Gulf. It has been evident for some time that the dynamics between the major Middle Eastern players are indeed undergoing...
Share on Facebook Share on LinkedIn Share on X

Neurodivergence in Cybersecurity: A Hidden Competitive Advantage

Personal growth manuals sell hyperfocus as the secret to success. Routines as the key to productivity. Stepping out of your comfort zone as a universal panacea. But Jeff Bezos (...
Share on Facebook Share on LinkedIn Share on X

Leroy Merlin Cyberattack Exposes Personal Data of French Customers

A cyberattack has affected Leroy Merlin, involving the personal data of numerous customers in France, impacting hundreds of thousands of individuals. Leroy Merlin assures that "additional security measures have been...
Share on Facebook Share on LinkedIn Share on X

Anonymity for Sale: Russian SIM Card Market Thrives Amid Regulations

Efforts by legislators and law enforcement to combat money laundering and more complex SIM card verification procedures have not significantly weakened the position of anonymous number dealers. This conclusion emerges...
Share on Facebook Share on LinkedIn Share on X

Hackers Compromise 120k IP Cameras for Pornographic Videos

South Korean police have reported the arrest of four individuals who, presumably independently, compromised over 120,000 IP cameras. According to investigators, at least two of them did so to steal...
Share on Facebook Share on LinkedIn Share on X

Microsoft Fixes Old Windows LNK Vulnerability Exploited in Attacks

Microsoft has quietly patched a long-standing Windows vulnerability that has been exploited in real-world attacks for several years. The update was released on November's Patch Tuesday, despite the company having...
Share on Facebook Share on LinkedIn Share on X

Critical React Server Vulnerability: Update Now to Prevent RCE Attacks

Developers and administrators around the world are urgently updating their servers following the discovery of a critical vulnerability in React Server, which allows attackers to remotely execute unauthenticated code with...
Share on Facebook Share on LinkedIn Share on X

Critical Vulnerability in King Addons for Elementor Exploited

During the registration process, a critical security flaw (CVE-2025-8489) in the King Addons WordPress Elementor plugin was exploited by attackers, allowing them to gain administrative privileges via a privilege escalation...
Share on Facebook Share on LinkedIn Share on X

Google Discover AI Headlines: Revolutionizing News Feed or Clickbait Nightmare?

Google is testing AI-generated headlines in its Discover feed, replacing original news headlines with original ones. Sean Hollister, editor-in-chief of The Verge, reported this , noting that short and often...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoinnovation
Red Hot Cyber and Hack The Box: together for the CTF at the RHC 2026 conference
Redazione RHC - 21/01/2026

In the Italian and European cybersecurity landscape, few collaborations manage to combine educational vision, technical realism, and community impact as effectively as the partnership announced between Red Hot Cyber and Hack The Box (HTB) for…

Immagine del sitoCybercrime
Everest Ransomware Attacks McDonald’s, 861GB Data Stolen
Redazione RHC - 21/01/2026

Yesterday, the Everest cybercriminal gang claimed responsibility for a cyberattack on McDonald’s on their Data Leak Site (DLS) . From the gang’s post, the cybercriminals claim to have 861GB of data exfiltrated from the company’s…

Immagine del sitoCybercrime
ESXi Zero-Day Exploit: How to Protect Your VMware Environment
Redazione RHC - 20/01/2026

A group of attackers is using a zero-day exploit toolkit to compromise VMware ESXi instances in an uncontrolled manner, taking advantage of multiple vulnerabilities to bypass virtual machine restrictions. The current incident highlights the ongoing…

Immagine del sitoCybercrime
Google Fast Pair Vulnerability: WhisperPair Exposes Millions of Devices
Redazione RHC - 19/01/2026

Researchers from the Cybersecurity and Industrial Cryptography team at KU Leuven have discovered a critical flaw in the Google Fast Pair protocol. The vulnerability allows attackers to hijack control of millions of Bluetooth devices, track…

Immagine del sitoCybercrime
Elon Musk Sues OpenAI for $134 Billion Over AI Betrayal
Redazione RHC - 19/01/2026

Elon Musk has filed a staggering $134 billion in damages in a malicious lawsuit against OpenAI and Microsoft. According to Bloomberg , the latest lawsuit accuses OpenAI of betraying its core mission as a nonprofit…