Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Redhotcyber Banner Sito 320x100px Uscita 101125
HackTheBox 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Amnesty International Launches .onion Site for Secure Access to Human Rights Info Cybercrime

Amnesty International Launches .onion Site for Secure Access to Human Rights Info

Amnesty International has launched its own website, accessible via the .onion domain on the Tor network, offering a new secure...
Redazione RHC - 12 December 2025
NANOREMOTE Trojan Uses Google Drive for Command and Control Cybercrime

NANOREMOTE Trojan Uses Google Drive for Command and Control

A new multifunctional Windows Trojan called NANOREMOTE uses a cloud file storage service as its command center , making the...
Redazione RHC - 12 December 2025
Microsoft Azure OAuth Attack: ConsentFix Malware Steals Accounts Cybercrime

Microsoft Azure OAuth Attack: ConsentFix Malware Steals Accounts

A new scheme called " ConsentFix " expands the capabilities of the already known ClickFix social media attack and allows...
Redazione RHC - 12 December 2025
Linux Foundation Launches Agentic AI Foundation with Key Tech Players Cybercrime

Linux Foundation Launches Agentic AI Foundation with Key Tech Players

The establishment of the Agentic AI Foundation (AAIF), a dedicated fund under the auspices of the Linux Foundation , was...
Redazione RHC - 12 December 2025
Disney Invests $1 Billion in OpenAI for Sora Video Deal Cybercrime

Disney Invests $1 Billion in OpenAI for Sora Video Deal

Disney will invest $1 billion in OpenAI and officially license its characters for use in its Sora video generator. The...
Redazione RHC - 12 December 2025
Microsoft 365 Okta Phishing Attack: Experts Warn of New Threat Cybercrime

Microsoft 365 Okta Phishing Attack: Experts Warn of New Threat

A recent study by Datadog Security Labs reveals an ongoing operation targeting organizations using Microsoft 365 and Okta for single...
Redazione RHC - 12 December 2025

US States Crack Down on VPNs and Online Privacy for Minors

Several U.S. states are debating new restrictions that could significantly change traditional approaches to online privacy . Legislators in Wisconsin and Michigan are considering initiatives to combat material deemed harmful...
Share on Facebook Share on LinkedIn Share on X

Logitech Hit by Clop Ransomware Attack, Data Breach Exposed

Logitech representatives have notified authorities of a cyberattack and a serious data breach . The notorious Clop ransomware group, which has been targeting companies for several months by exploiting a...
Share on Facebook Share on LinkedIn Share on X

Malware Uses Finger Command to Infect Windows Devices

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet,...
Share on Facebook Share on LinkedIn Share on X

The Future of Tech: How to Navigate the Digital World

There are books that explain technology and books that make you understand why you should pause for a minute before scrolling through a feed. Il Futuro Prossimo , Sandro Sana...
Share on Facebook Share on LinkedIn Share on X

Google Gemini 3.0 Shakes Nvidia’s AI Dominance with TPU Innovation

Nvidia's dominance in the artificial intelligence (AI) sector was shaken by the acclaim for Google's "Gemini 3.0." Nvidia's stock price fell more than 2% in after-hours trading. SK Hynix, a...
Share on Facebook Share on LinkedIn Share on X

CISA Warns of Spyware Attacks on Mobile Messaging Apps

An important advisory was published on Monday by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) , warning that malicious actors are actively using commercial spyware tools and remote access...
Share on Facebook Share on LinkedIn Share on X

New ClickFix Malware Campaign Targets Windows Users with Fake Updates

Fake Windows updates have entered a new round of ClickFix campaigns, as reported by Huntress. Attackers are increasingly replacing bot controls with full-screen blue windows that simulate a system update....
Share on Facebook Share on LinkedIn Share on X

GDPR Data Breach: Email Errors and Consequences

Like it or not, sending an email to the wrong recipient constitutes a personal data breach under the GDPR. This obviously applies if the email contains personal data or if...
Share on Facebook Share on LinkedIn Share on X

Ettore Accenti: The Italian Tech Pioneer Who Brought Intel to Italy

With exclusive photographs and unpublished documents: the extraordinary story of the Italian engineer who collaborated with Gordon Moore and Alan Sugar, bringing Intel to Italy and building the first tech...
Share on Facebook Share on LinkedIn Share on X
Evoluzione-da-wep-a-wpa-3

The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app....
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Two Ukrainians Suspected in Black Basta Ransomware Attacks
Redazione RHC - 17/01/2026

When it comes to cybersecurity, it’s not uncommon to come across news stories that seem straight out of a science fiction movie. Yet, the reality is even more surprising and sometimes disturbing. The story of…

Immagine del sitoCybercrime
Gootloader Malware Returns with Enhanced Evasion Techniques
Redazione RHC - 17/01/2026

After a long period of silence, the Gootloader downloader malware has returned to the forefront. Last November, the Huntress team detected a new campaign signaling the return of a developer previously associated with the Vanilla…

Immagine del sitoCybercrime
VoidLink Malware: Advanced Linux Framework Targets Cloud Infrastructures
Redazione RHC - 16/01/2026

Check Point researchers have discovered a new Linux infection framework distinguished by its advanced modular architecture and wide range of features. The malware has been dubbed VoidLink . The framework is composed of over 30…

Immagine del sitoCybercrime
Microsoft Copilot Vulnerability Exposes User Data to Hackers
Redazione RHC - 15/01/2026

A recently fixed vulnerability allowed attackers to exploit Microsoft Copilot Personal with a single click to steal sensitive user data. Using a phishing link, attackers were able to take control of sessions without requiring further…

Immagine del sitoCybercrime
Progress Software Patches LoadMaster, MOVEit WAF Vulnerabilities
Redazione RHC - 15/01/2026

On January 12, 2026, Progress Software Corporation released patches that address two high-severity Command Injection vulnerabilities, which could allow remote attackers to execute malicious code on LoadMaster load balancers and MOVEit Web Application Firewalls (WAFs).…