Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Fortinet 320x100px
Fortinet 970x120px

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

The Dark Side of Internet Control: Durov’s Warning

Post 462 on Durov's official channel immediately went into “scream mode”: “ The end of the free internet. The free...
Sandro Sana - 2 December 2025

Phishing Attacks Surge in Black Friday Season: Stay Vigilant

This year, too, cybercriminals are taking advantage of seasonal shopping periods to spread phishing websites and fraudulent promotions, aiming to...
Redazione RHC - 2 December 2025

Human Washing Machine Launched: Japan’s Science Unveils Unique Device

Japanese company Science has launched a washing machine for humans. The 2.30-meter-long capsule bathes a person in 15 minutes and...
Redazione RHC - 1 December 2025

Brazilian Systems Targeted in Sophisticated OAST Exploit Campaign

Security researchers have discovered a sophisticated exploit campaign that leverages a private out-of-band application security testing (OAST) service hosted on...
Redazione RHC - 1 December 2025

Australian Man Jailed for Evil Twin Wi-Fi Scam Targeting Airline Passengers

An Australian court has convicted a 44-year-old man who stole the personal data of airline passengers and airport visitors over...
Redazione RHC - 1 December 2025

KrakenBite Phishing Service Exposed

The underground cybercrime market continues to evolve rapidly, fueled by specialized groups designing and selling tools for increasingly sophisticated digital...
Redazione RHC - 1 December 2025

The Louvre was deceived by two Belgian pranksters! They hung their painting next to the Mona Lisa.

Louvre security is under fire again after pranksters managed to trick guards and hang their painting in the same room as the Mona Lisa. Belgian duo Neel and Senne gained...
Share on Facebook Share on LinkedIn Share on X

Are Black Hackers Demanding Ransom? Checkout.com Responds: We Fund Those Hunting You

Payment service Checkout.com was the victim of an extortion attempt: the ShinyHunters group claimed to have accessed company data and demanded a ransom. An investigation revealed that the attackers had...
Share on Facebook Share on LinkedIn Share on X

Trump, Hong Kong, and the Global Rush to Regulate Cryptocurrencies

Throughout 2024, there were several signs of a shift in the relationship between institutions and cryptocurrencies. On March 6, President Donald Trump signed an executive order establishing a "Bitcoin Strategic...
Share on Facebook Share on LinkedIn Share on X

Sam Altman and her husband Oliver and the dream of genetically modified children

The pursuit of immortality is a pervasive obsession in Silicon Valley. Likewise, the idea of perfecting children through genetic modification is another. Sam Altman, the man who brought artificial intelligence...
Share on Facebook Share on LinkedIn Share on X

The stress of social network algorithms causes burnout in creators

A new research project has shown that the online content industry, which has offered people thousands of new ways to earn money, is also placing significant mental stress on its...
Share on Facebook Share on LinkedIn Share on X

Discovering Tor Browser: The Digital Fortress for Online Privacy

Tor Browser (short for The Onion Router) is a free, open-source web browser designed specifically to protect users' online privacy. Using a network of servers distributed around the world, Tor...
Share on Facebook Share on LinkedIn Share on X

Virtual Private Network (VPN): What It Is, How It Works, and Why

A VPN , short for Virtual Private Network, is a system that allows you to establish a secure and private connection over a public network, such as the Internet ....
Share on Facebook Share on LinkedIn Share on X

Rare Earths: What They Are and Why They Matter More Than Oil in Today’s World

We often hear about the so-called "Rare Earths". This is a set of seventeen metallic elements. These include the fifteen lanthanides on the periodic table , plus scandium and yttrium...
Share on Facebook Share on LinkedIn Share on X

Let’s discover injections explained in a simple way

Good morning everyone. I'm Davide Cavallini, a web developer and penetration tester. Today I'm going to talk about injections. There are various types, but what does it conceptually mean to...
Share on Facebook Share on LinkedIn Share on X

A journey into the world of OT/ICS: What are SCADA servers?

The world of OT (Operational Technology) and ICS (Industrial Control Systems) is closely related to SCADA (Supervisory Control and Data Acquisition) systems. In industrial automation, SCADA systems play a fundamental...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sito
La Poste Hit by Pro-Russian DDoS Attack During Peak Holiday Season
Redazione RHC - 23/12/2025

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…

Immagine del sito
CVE-2025-47761: FortiClient VPN Zero-Day Exploit Lets Privilege Escalation
Manuel Roccon - 23/12/2025

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…

Immagine del sito
Critical MongoDB Vulnerability Exposed: CVE-2025-14847
Redazione RHC - 23/12/2025

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…

Immagine del sito
RansomHouse Ransomware Upgraded: Enhanced Encryption Threat
Redazione RHC - 22/12/2025

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…

Immagine del sito
Cyber Attacks on the Rise: Wiper Malware and Data Destruction in 2025
Redazione RHC - 22/12/2025

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers use wipers, destructive tools that…