Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Ransomfeed 320x100 1
Crowdstriker 970×120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

GhostFrame Phishing Kit: New Stealthy PhaaS Threat Emerges Cybercrime

GhostFrame Phishing Kit: New Stealthy PhaaS Threat Emerges

Barracuda has released details of a new stealthy, evasive phishing-as-a-service (PhaaS) kit that hides malicious content within web page iframes...
Redazione RHC - 14 December 2025
WhatsApp: all it takes is a phone number to know when you sleep, go out, or come home Cybercrime

WhatsApp: all it takes is a phone number to know when you sleep, go out, or come home

A tool has been released that allows for the discreet monitoring of WhatsApp and Signal user activity using just a...
Redazione RHC - 14 December 2025
Cyber Geopolitics: How Tech Becomes a Global Battleground Cybercrime

Cyber Geopolitics: How Tech Becomes a Global Battleground

Over the past two years, cyber has ceased to be a " technical " dimension of the conflict and has...
Roberto Villani - 14 December 2025
SOAP Vulnerability in .NET Framework Allows Remote Code Execution Cybercrime

SOAP Vulnerability in .NET Framework Allows Remote Code Execution

Security researchers have discovered a vulnerability in .NET that could affect several enterprise products and lead to remote code execution....
Redazione RHC - 14 December 2025
CVE-2025-55182 React Server Components Vulnerability Exploited Cybercrime

CVE-2025-55182 React Server Components Vulnerability Exploited

A recent report from the Google Threat Intelligence Group (GTIG) illustrates the chaotic results of this information dissemination, highlighting how...
Redazione RHC - 13 December 2025
Top 25 Software Vulnerabilities 2025: MITRE CWE Ranking and Security Tips Cybercrime

Top 25 Software Vulnerabilities 2025: MITRE CWE Ranking and Security Tips

MITRE has released its ranking of the 25 most dangerous software vulnerabilities predicted for 2025, based on data collected through...
Redazione RHC - 13 December 2025

KrakenBite Phishing Service Exposed

The underground cybercrime market continues to evolve rapidly, fueled by specialized groups designing and selling tools for increasingly sophisticated digital scams. Among these, a particularly active player in recent weeks...
Share on Facebook Share on LinkedIn Share on X

ADC Aerospace Hit by Play Ransomware Attack, Data Breach Feared

American aviation and defense components manufacturer ADC Aerospace has found itself in the spotlight due to a possible cyber attack by the Play ransomware group, which appeared on their blog...
Share on Facebook Share on LinkedIn Share on X

Microsoft 365 Security Risk: Interface Poisoning Attacks

This article analyzes the disclosure submitted to Microsoft and available in English on digitaldefense , where images, demonstration videos and a Python code example are available. In recent years, digital...
Share on Facebook Share on LinkedIn Share on X

Calendar Subscriptions: A Hidden Danger in Your Digital Life

Digital calendars have long been a convenient way to keep track of daily activities, but new research from Bitsight shows that this familiar tool can become a real attack channel....
Share on Facebook Share on LinkedIn Share on X

Airbus A320 Recall Due to ELAC System Failure Caused by Solar Flares

Airbus has announced the recall of approximately 6,500 A320 aircraft due to potential failures in the ELAC control system caused by powerful solar flares. The recall followed a sudden loss...
Share on Facebook Share on LinkedIn Share on X

OpenAI Faces Fierce Competition from Google’s Gemini 3

OpenAI, a company valued at around $500 billion, is facing increasingly fierce technical competition . Google's latest version of Gemini 3 , in particular, outperforms OpenAI's GPT-5 in several areas....
Share on Facebook Share on LinkedIn Share on X

Leonardo’s Michelangelo Dome: AI-Powered Defense Against Hypersonic Threats

Italian defense company Leonardo has unveiled its new Michelangelo Dome system . According to the company, it is designed to counter hypersonic missiles and mass drone attacks . During the...
Share on Facebook Share on LinkedIn Share on X

Windows 11 Password Issue: Microsoft Warns of Invisible Icon Bug

Microsoft has warned users of a Windows 11 glitch: after the release of updates starting in August 2025 , the password-based sign-in button may disappear from the lock screen. While...
Share on Facebook Share on LinkedIn Share on X

CISA Warns of OpenPLC ScadaBR Vulnerability Exploitation

The Cybersecurity and Infrastructure Security Agency (CISA) has expanded its list of exploited vulnerabilities (KEVs), reporting a new vulnerability affecting OpenPLC ScadaBR , due to ongoing active exploitation indications. This...
Share on Facebook Share on LinkedIn Share on X

The Power of A* Algorithm in Artificial Intelligence and Robotics

Nearly everything artificial intelligence does today is based on a simple but fundamental idea: any problem can be reduced to finding a path from a starting point to a goal....
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Cybercrime Meets Real-Life Violence: Foxtrot Network’s Dark Side
Redazione RHC - 13/01/2026

In recent months, there has been increasing talk of a paradigm shift in cybercrime . What for years was perceived as a predominantly digital ecosystem— consisting of fraud, identity theft, online extortion, and cyberattacks —is…

Immagine del sitoCybercrime
Iran Cyber Crisis: Connettività Compromised
Roberto Villani - 13/01/2026

Sometimes important things don’t arrive at a press conference. They arrive like a graph that stops breathing: the connectivity line collapses, the OSINT dries up, the noise grows as the signal disappears. In Iran, the…

Vulnerability
ServiceNow AI Vulnerability CVE-2025-12420: Critical Security Risk
Redazione RHC - 13/01/2026

A critical flaw has been identified in ServiceNow’s artificial intelligence platform, with a severity score of 9.3 out of 10. This vulnerability, classified as CVE-2025-12420, could allow attackers to impersonate legitimate users without authenticating. ServiceNow…

Immagine del sitoCybercrime
CRISPR-Cas13: Breakthrough in Flu Treatment with Gene Editing
Redazione RHC - 12/01/2026

Influenza remains one of the most stubborn and unpleasant infections on the planet. It returns every winter, mutating, evading the immune system, and eventually becoming drug-resistant. Now, scientists are proposing an unexpected approach that could…

Immagine del sitoCybercrime
Internet Shutdowns Cost $19.7B in 2025, Sophisticated Censorship Rises
Redazione RHC - 11/01/2026

Imagine a situation where the internet appears to be working, but websites won’t open beyond the first screen, messaging apps are intermittent, and businesses are constantly changing. According to the authors of a recent annual…