Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

970x120 Olympous

Latest news

Make training an adventure! Choose Betti RHC for your cybersecurity awareness. Cyber News

Make training an adventure! Choose Betti RHC for your cybersecurity awareness.

Are you tired of boring e-learning training courses? Do you really want to educate your company's employees about bad and...
Agostino Pellegrino - September 29, 2025
Akira Ransomware: New Campaign Targets SonicWall Firewalls Cyber News

Akira Ransomware: New Campaign Targets SonicWall Firewalls

Since late July 2025, a new wave of cyber attacks has been recorded targeting organizations equipped with SonicWall firewalls, with...
Redazione RHC - September 28, 2025
Fujitsu unveils Post-K: the ARM supercomputer that will be 100 times faster than “K” Cyber News

Fujitsu unveils Post-K: the ARM supercomputer that will be 100 times faster than “K”

After having signed the contract to build the Japanese supercomputer "K," one of the most powerful in the world, Fujitsu...
Redazione RHC - September 28, 2025
Delivery of €13 million in submarine cables for the Shanhaiguan offshore project Cyber News

Delivery of €13 million in submarine cables for the Shanhaiguan offshore project

At Haihui Port in Xiaoting, along the Yangtze River, a large red steel structure provided the backdrop for the delivery...
Sandro Sana - September 28, 2025
Microsoft gives in to EU pressure: Windows 10 will get free security updates. Cyber News

Microsoft gives in to EU pressure: Windows 10 will get free security updates.

Microsoft has agreed to address the demands of European human rights activists and extend Windows 10 support to users in...
Stefano Gazzella - September 28, 2025
New wave of malicious emails associated with the Hive0117 group Cyber News

New wave of malicious emails associated with the Hive0117 group

F6 has reported a new wave of malicious emails associated with the Hive0117 group. Hive0117 has been active since February...
Redazione RHC - September 27, 2025
An SVG file disguised as a PDF led victims to a fake login Cyber News

An SVG file disguised as a PDF led victims to a fake login

Microsoft Threat Intelligence specialists have identified an attack in which attackers used artificial intelligence for the first time to disguise...
Redazione RHC - September 27, 2025
Rhadamanthys Stealer: Introduces an AI feature to extract seed phrases from images Cyber News

Rhadamanthys Stealer: Introduces an AI feature to extract seed phrases from images

Rhadamanthys is an advanced information stealer that first emerged in 2022. Featuring a rapid development cycle—with at least ten different...
Sandro Sana - September 26, 2025
Active Directory nel mirino! Come i criminal hacker rubano NTDS.dit Cyber News

Active Directory nel mirino! Come i criminal hacker rubano NTDS.dit

Active Directory (AD) contains the organization's digital keys: unauthorized access to this service exposes sensitive information and credentials that can...
Redazione RHC - September 26, 2025
Fezbox Malware: The NPM Package That Steals Cookies with QR Codes Cyber News

Fezbox Malware: The NPM Package That Steals Cookies with QR Codes

Researchers discovered a malicious package called fezbox in npm that steals victims' cookies. To ensure the malicious activity remains undetected,...
Massimiliano Brolli - September 26, 2025
Forget brains and notebooks! ChatGPT dominates classrooms. Cyber News

Forget brains and notebooks! ChatGPT dominates classrooms.

ChatGPT usage has skyrocketed with the start of the new school year in the West, with token generation hitting record...
Luca Vinciguerra - September 26, 2025
Ransomware attack on European airports leaves Berlin in “emergency mode” Cyber News

Ransomware attack on European airports leaves Berlin in “emergency mode”

Berlin Airport (BER) remains in "emergency mode" for the fifth day after a major cyberattack on its supply chain. Der...
Redazione RHC - September 26, 2025

Discovering Tor Browser: The Digital Fortress for Online Privacy

Tor Browser (short for The Onion Router) is a free, open-source web browser designed specifically to protect users' online privacy. Using a network of servers distributed around the world, Tor...

Virtual Private Network (VPN): What It Is, How It Works, and Why

A VPN , short for Virtual Private Network, is a system that allows you to establish a secure and private connection over a public network, such as the Internet ....

Rare Earths: What They Are and Why They Matter More Than Oil in Today’s World

We often hear about the so-called "Rare Earths". This is a set of seventeen metallic elements. These include the fifteen lanthanides on the periodic table , plus scandium and yttrium...

Let’s discover injections explained in a simple way

Good morning everyone. I'm Davide Cavallini, a web developer and penetration tester. Today I'm going to talk about injections. There are various types, but what does it conceptually mean to...

A journey into the world of OT/ICS: What are SCADA servers?

The world of OT (Operational Technology) and ICS (Industrial Control Systems) is closely related to SCADA (Supervisory Control and Data Acquisition) systems. In industrial automation, SCADA systems play a fundamental...

Quishing: What it is, how it works, and how to protect yourself

Quishing is an emerging form of cyberattack that combines traditional phishing with the use of QR codes , tools now familiar to many. The term " quishing " is a...

Password Managers: A Complete Guide to Choosing and Using Them

Passwords: how important are they in our digital lives? How many times have we reported this on our pages? Most digital activities— from social media to banking to online shopping...

Discovering the NIS2 Directive: Security and Resilience of Digital Systems in the European Union

On 10 November 2022, the European Parliament, by a large majority, approved the NIS2 (Network and Information System Security) Directive with its publication in the Official Journal of the European...

Kraken Arrives: The New Ransomware That Assesses Your Environment to Inflict Maximum Damage

Cisco Talos researchers have detected an active wave of attacks using a new ransomware called Kraken. The group began operating in February 2025 and uses double-extortion methods, without targeting specific...

North Korea reorganizes its intelligence with a new agency

North Korea has restructured its intelligence hierarchy, transforming the former Intelligence Agency into a structure with a much broader mandate. The new body, called the General Intelligence Directorate (GIRD), brings...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE