Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Redhotcyber Banner Sito 320x100px Uscita 101125
Banner Ransomfeed 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Digital Stress: How to Achieve Balance in a Hyper-Connected World Cybercrime

Digital Stress: How to Achieve Balance in a Hyper-Connected World

We live in dissociation: we praise work-life balance, yet we find ourselves constantly online, like puppets on invisible strings. The...
Daniela Farina - 11 December 2025
DeadLock Ransomware Exploits Baidu Antivirus Vulnerability for EDR Bypass Cybercrime

DeadLock Ransomware Exploits Baidu Antivirus Vulnerability for EDR Bypass

Cisco Talos has identified a new ransomware campaign called DeadLock : attackers are exploiting a vulnerable Baidu antivirus driver (CVE-2024-51324)...
Redazione RHC - 11 December 2025
VPN Credentials on the Dark Web: A Growing Cybersecurity Threat Cybercrime

VPN Credentials on the Dark Web: A Growing Cybersecurity Threat

In the darkest corners of the internet, the trafficking of stolen data and unauthorized access continues to thrive. A recent...
Redazione RHC - 11 December 2025
Uncovering Russia’s Cyber Operations: CISM’s Role in DDoS Attacks Cybercrime

Uncovering Russia’s Cyber Operations: CISM’s Role in DDoS Attacks

What we wrote in the article " Patriotic Code: from DDoSia and NoName057(16) to CISM, the algorithm that shapes youth...
Redazione RHC - 11 December 2025
Microsoft Outlook RCE Vulnerability: Update Now to Prevent Attacks Cybercrime

Microsoft Outlook RCE Vulnerability: Update Now to Prevent Attacks

A critical remote code execution (RCE) vulnerability in Outlook has been patched by Microsoft, potentially allowing attackers to run malicious...
Redazione RHC - 11 December 2025
Google Chrome Urgent Update Fixes Zero-Day Vulnerability Cybercrime

Google Chrome Urgent Update Fixes Zero-Day Vulnerability

An urgent update has been released by Google for the stable version of the Desktop browser, in order to address...
Redazione RHC - 11 December 2025

Be careful when using SSDs! Without power, you risk data loss

XDA Developers reminds us that using solid-state drives for long-term storage is risky. If SSDs are left without power for years, data can become corrupted or even disappear entirely. Unlike...
Share on Facebook Share on LinkedIn Share on X

Quantum Computing vs. Artificial Intelligence: Which Will Really Change the Future?

Quantum mechanics remains a complex and mysterious field, both difficult to explain and difficult to understand. This branch of physics studies the unusual behavior of tiny particles, phenomena that are...
Share on Facebook Share on LinkedIn Share on X

ToddyCat APT Group Targets Microsoft 365 Email Security

Email security continues to be one of the most critical points in modern cyber attacks. While compromising a Windows domain is already a success for a malicious actor, gaining access...
Share on Facebook Share on LinkedIn Share on X

Tor Boosts Security with Counter Galois Onion CGO Encryption

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to...
Share on Facebook Share on LinkedIn Share on X

WormGPT 4: AI-Powered Cybercrime Tools on the Rise

Cybercriminals no longer need to convince ChatGPT or Claude Code to write malware or data-stealing scripts. A whole class of specialized language models, specifically designed for attacks, already exists. One...
Share on Facebook Share on LinkedIn Share on X

EU lawmakers push for Microsoft alternative to boost tech sovereignty

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns...
Share on Facebook Share on LinkedIn Share on X

Investment Scam Alert: How to Avoid Losing Thousands

Hi everyone... my name is Marco, I'm 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of...
Share on Facebook Share on LinkedIn Share on X

Trump Launches Genesis AI Mission to Revolutionize US Science

US President Donald Trump signed an executive order, " Launching the Genesis Mission," establishing a national program for the use of artificial intelligence in science. The document was published on...
Share on Facebook Share on LinkedIn Share on X

Cybersecurity in the Middle East: Egitto and Qatar Lead the Way

Global attention to cybersecurity continues to grow in a context dominated by digital transformation and the rapid spread of artificial intelligence (AI) technologies, making it easier to identify vulnerabilities and...
Share on Facebook Share on LinkedIn Share on X

US States Crack Down on VPNs and Online Privacy for Minors

Several U.S. states are debating new restrictions that could significantly change traditional approaches to online privacy . Legislators in Wisconsin and Michigan are considering initiatives to combat material deemed harmful...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Instagram Data Leak Exposes 17.5 Million Users on Dark Web
Redazione RHC - 10/01/2026

A massive digital archive containing the private information of approximately 17.5 million Instagram users appears to have fallen into the hands of cybercriminals. A few hours ago, the alarm was raised after several Reddit users…

Immagine del sitoCybercrime
Undertow Vulnerability CVE-2025-12543 Exposes Java Ecosystem to Critical Security Risks
Redazione RHC - 09/01/2026

A flaw has been discovered in the foundation of the Java web ecosystem. Undertow , the high-performance web server that powers enterprise heavyweights like WildFly and JBoss EAP , has been hit by a critical…

Immagine del sitoCybercrime
Iran Protests Escalate as Reza Pahlavi Calls for Action Against Government
Redazione RHC - 09/01/2026

Iranian protesters chanted and marched through the streets until Friday morning, following a call from exiled former Prince Reza Pahlavi to demonstrate, despite the Iranian theocracy cutting off the country from the internet and international…

Immagine del sitoCybercrime
Veeam Backup Vulnerability: Critical RCE Flaw Discovered – Update Now
Redazione RHC - 08/01/2026

Backups are generally considered the last line of defense, but this week Veeam reminded us that backup systems themselves can become entry points for attacks. The company released security updates for Backup & Replication ,…

Immagine del sitoCybercrime
When Attack Discovery Becomes Automated, Detection Stops Scaling
Alexander Rogan - 08/01/2026

For much of the past two decades, cybersecurity has been built on a simple assumption: malicious activity can be detected, analysed, and responded to before meaningful damage occurs. This assumption shaped everything from SOC design…