Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Enterprise BusinessLog 320x200 1
LECS 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

OSINT Ethics and Legality: Navigating Open Source Intelligence Cybercrime

OSINT Ethics and Legality: Navigating Open Source Intelligence

Open Source Intelligence (OSINT) has emerged in recent years as one of the most fascinating, yet most insidious, disciplines in...
Alexandro Irace - 17 December 2025
The Psychology of Passwords: Why Weak Passwords Persist Cybercrime

The Psychology of Passwords: Why Weak Passwords Persist

The psychology of passwords starts right here: trying to understand people before systems. Welcome to "The Mind Behind Passwords," the...
Simone D'Agostino - 17 December 2025
Russian Cyber Operations Shift to Targeting Western Critical Infrastructure Cybercrime

Russian Cyber Operations Shift to Targeting Western Critical Infrastructure

New details emerge from an Amazon Threat Intelligence report that highlight an alarming shift in Russian government-backed cyber operations. High-level...
Redazione RHC - 17 December 2025
Google Chrome Security Update Fixes Critical Vulnerabilities Cybercrime

Google Chrome Security Update Fixes Critical Vulnerabilities

A significant security update has been released by Google for the stable desktop channel, which addresses two very serious vulnerabilities...
Redazione RHC - 17 December 2025
Spiderman Phishing Kit Targets European Banks and Crypto Users Cybercrime

Spiderman Phishing Kit Targets European Banks and Crypto Users

Varonis researchers have discovered a new PhaaS platform, called Spiderman, that targets users of European banks and cryptocurrency services. Attackers...
Redazione RHC - 17 December 2025
AI Smart Glasses for Police: Efficient Vehicle Checks in China innovation

AI Smart Glasses for Police: Efficient Vehicle Checks in China

The Changsha traffic police have begun using AI-powered smart glasses in their daily patrols. This was confirmed by the city's...
Redazione RHC - 17 December 2025

Kawasaki CORLEO Robot Quadrupede for Human Transport by 2035

Kawasaki Heavy Industries plans to launch a quadruped robot capable of carrying humans in 2035. Kawasaki Heavy Industries announced on December 3 that it has begun production of " CORLEO...
Share on Facebook Share on LinkedIn Share on X

Candle Subsea Cable Revolutionizes Asia-Pacific Internet Connectivity

70 million simultaneous 8K videos at 570 Tbps ! This is a staggering amount of transport power in a submarine cable and will change internet access in the Asia-Pacific region....
Share on Facebook Share on LinkedIn Share on X

Google Chrome 143 Patch Fixes Critical V8 JavaScript Vulnerability

Google has released Chrome 143 for Windows, macOS, and Linux; the release contains an important patch. The new version ( 143.0.7499.40 for Linux and 143.0.7499.40/41 for Windows and macOS) addresses...
Share on Facebook Share on LinkedIn Share on X

Cybersecurity in December: How Compliance Hurries Leave Companies Vulnerable

December isn't just about Christmas lights: for those working in cybersecurity, it's the month when the human factor collapses and companies rush to buy solutions just to be "compliant" for...
Share on Facebook Share on LinkedIn Share on X

Managing AI Agents: Mitigating Security Risks in Autonomous Systems

The widespread adoption of artificial intelligence in businesses is profoundly transforming operational processes and, at the same time, introducing new security vulnerabilities . Companies are using these systems to increase...
Share on Facebook Share on LinkedIn Share on X

Mistral AI Unveils Powerful Open Source Models for Advanced AI Applications

French company Mistral AI has unveiled its Mistral 3 line of models, making them fully open source under the Apache 2.0 license . The series includes several compact and dense...
Share on Facebook Share on LinkedIn Share on X

Maha Grass APT Group Unleashes StreamSpy Malware Attacks

The Patchwork cyber espionage group — also known as Hangover or Dropping Elephant and internally tracked by QiAnXin as APT-Q-36 — has been active since 2009 and is believed to...
Share on Facebook Share on LinkedIn Share on X

Digital Crime Among Teenagers: Temporary Involvement

Dutch authorities have published data showing that adolescents' involvement in cybercrime is usually temporary. An analysis prepared by the House of Representatives indicates that early interest in hacking often fades...
Share on Facebook Share on LinkedIn Share on X

Porsche Russia Alarm Issues Spark Widespread Vehicle Immobilization

Porsche owners in Russia are increasingly experiencing problems with factory alarms, making it impossible to use their cars. Their cars won't start, stall immediately after starting, or display engine-related errors...
Share on Facebook Share on LinkedIn Share on X

Cryptomixer Shut Down: Europol Cracks Down on $1.3B Bitcoin Mixing Service

Law enforcement agencies in Switzerland and Germany have reported the dismantling of Cryptomixer , a major mixing service operating since 2016 that helped criminals launder illicitly obtained funds. According to...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
VoidLink Malware: Advanced Linux Framework Targets Cloud Infrastructures
Redazione RHC - 16/01/2026

Check Point researchers have discovered a new Linux infection framework distinguished by its advanced modular architecture and wide range of features. The malware has been dubbed VoidLink . The framework is composed of over 30…

Immagine del sitoCybercrime
Microsoft Copilot Vulnerability Exposes User Data to Hackers
Redazione RHC - 15/01/2026

A recently fixed vulnerability allowed attackers to exploit Microsoft Copilot Personal with a single click to steal sensitive user data. Using a phishing link, attackers were able to take control of sessions without requiring further…

Immagine del sitoCybercrime
Progress Software Patches LoadMaster, MOVEit WAF Vulnerabilities
Redazione RHC - 15/01/2026

On January 12, 2026, Progress Software Corporation released patches that address two high-severity Command Injection vulnerabilities, which could allow remote attackers to execute malicious code on LoadMaster load balancers and MOVEit Web Application Firewalls (WAFs).…

Immagine del sitoCybercrime
24-Year-Old Hacker Breaches US Supreme Court Database
Redazione RHC - 14/01/2026

Do you remember the 24-year-old hacker Carmelo Miano and the breaches of the Naples Prosecutor’s Office’s accounts and computer systems? It appears something similar happened in the United States, and the other young man is…

Immagine del sitoCybercrime
Cloudflare vs Italy: The Battle for Internet Freedom and DNS Control
Redazione RHC - 14/01/2026

Cloudflare CEO Matthew Prince has threatened to shut down the company’s operations in Italy after the country’s telecom regulator fined it twice its annual revenue in the country. The facts The conflict erupted around Italy’s…