Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
LECS 320x100 1
UtiliaCS 970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

DeepSeekMath-V2 Revolutionizes Math with AI-Powered Proof Verification

The Chinese company DeepSeek has introduced a new specialized model for solving mathematical problems , DeepSeekMath-V2. This large-scale language model,...
Redazione RHC - 30 November 2025

Shai-Hulud Attack: npm Supply Chain Compromised Again

The npm ecosystem is once again at the center of a large-scale supply chain attack attributed to the Shai-Hulud campaign....
Redazione RHC - 30 November 2025

ChatGPT to Introduce Targeted Ads, Changing Monetization Strategy

Until now, ChatGPT has been ad-free: no banners, no hidden promotions. Even the paid versions worked without pushy offers. But...
Redazione RHC - 29 November 2025

GitLab Security Updates Fix High-Severity Vulnerabilities CVE-2024-9183

GitLab has released critical security updates for its Community Edition (CE) and Enterprise Edition (EE) to address several high-severity vulnerabilities...
Redazione RHC - 29 November 2025

Apache SkyWalking Vulnerability Exposes Users to XSS Attacks

A vulnerability was recently discovered in Apache SkyWalking , a popular application performance monitoring tool, that attackers could exploit to...
Redazione RHC - 29 November 2025

Bloody Wolf Attacks Central Asia with NetSupport RAT via Java Exploits

Group-IB specialists have recorded new attacks by the Bloody Wolf hacker group, which has been targeting Kyrgyzstan since June 2025...
Redazione RHC - 29 November 2025

Discovering Remote Code Execution (RCE). The most feared security bug!

Of all the vulnerabilities, the most feared by victims and the most sought after by attackers is remote code execution, or RCE. This vulnerability allows arbitrary commands to be executed...
Share on Facebook Share on LinkedIn Share on X

Google, Amazon, and Meta and Their “Submarine War”

Global traffic, as RHC readers know, travels mostly under the sea. According to TeleGeography, a telecommunications institute, there are more than 530 active submarine optical cable systems worldwide, which together...
Share on Facebook Share on LinkedIn Share on X

TIM and Poste Italiane launch the sovereign cloud: the birth of the Italian-made AI and innovation hub

It was time for Italy to wait for a clear signal in the area of digital sovereignty. The union of two giants like TIM and Poste Italiane represents more than...
Share on Facebook Share on LinkedIn Share on X

An “autonomous” spy campaign was orchestrated by artificial intelligence

An analysis conducted in recent months had highlighted how the evolution of artificial intelligence systems was reaching a critical point for cybersecurity, with capabilities doubling in just six months ....
Share on Facebook Share on LinkedIn Share on X

A 0-day exploit on FortiWeb WAF is actively exploited! And remove the Admin interfaces from the Internet

Attackers are actively exploiting a critical flaw in Fortinet’s FortiWeb web application protection (WAF) system, which could be used as a means to conduct zero-day attacks without prior detection. As...
Share on Facebook Share on LinkedIn Share on X

VLC and its creator receive award for choosing freedom over millions of dollars

Whenever you come across an unknown media file or a strange link that won't open with any standard application, there's always one program that comes to the rescue: VLC ....
Share on Facebook Share on LinkedIn Share on X

What is Misevolution: The Autonomous Evolution of AI Agents, and It’s Not Always Good

Shanghai, November 11, 2025 – A new study conducted by the Shanghai Artificial Intelligence Laboratory , in collaboration with Shanghai Jiao Tong University , Renmin University of China , and...
Share on Facebook Share on LinkedIn Share on X

Tanks are no longer needed: new wars are fought from a laptop

Author: Roberto Villani, Tanslate: Vincenzo Marcovecchio Why will the cyberg wars, indeed the cyber-guerrillas, be more and more present and involve us more and more? The short century, the 1900s...
Share on Facebook Share on LinkedIn Share on X

A 0Day bug for a WordPress plugin sold for 6000 euros in the underground

On one of Russia's most popular forums for buying and selling vulnerabilities and attack tools, the thread appeared as a standard commercial ad, but the content is anything but trivial....
Share on Facebook Share on LinkedIn Share on X

Can a cyber attack reduce a country’s GDP? In the UK, it seems so!

The British economy contracted further in September, largely due to the cyber attack on car manufacturer Jaguar Land Rover (JLR) and its forced closure. A new report from the Office...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sito
A backdoor in NVIDIA code. Three 9.8 bugs plague AI and robotics development systems
Redazione RHC - 24/12/2025

When it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…

Immagine del sito
La Poste Hit by Pro-Russian DDoS Attack During Peak Holiday Season
Redazione RHC - 23/12/2025

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…

Immagine del sito
CVE-2025-47761: FortiClient VPN Zero-Day Exploit Lets Privilege Escalation
Manuel Roccon - 23/12/2025

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…

Immagine del sito
Critical MongoDB Vulnerability Exposed: CVE-2025-14847
Redazione RHC - 23/12/2025

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…

Immagine del sito
RansomHouse Ransomware Upgraded: Enhanced Encryption Threat
Redazione RHC - 22/12/2025

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…