Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
LECS 320x100 1
UtiliaCS 970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

CISA Warns: Avoid Personal VPNs for Secure Mobile Communications Cybercrime

CISA Warns: Avoid Personal VPNs for Secure Mobile Communications

In new mobile communications advisories, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a stern warning to smartphone...
Redazione RHC - 9 December 2025
SAP Security Update Fixes Critical Code Injection Vulnerability in Solution Manager Cybercrime

SAP Security Update Fixes Critical Code Injection Vulnerability in Solution Manager

SAP has just released its latest annual security update, which contains 14 new security bug fixes. Among them is a...
Redazione RHC - 9 December 2025
Passwordless Authentication: The Future of Secure Online Access Cybercrime

Passwordless Authentication: The Future of Secure Online Access

Using passwords to access online accounts is no longer as secure as it once was. In fact, passwords are now...
Redazione RHC - 9 December 2025
Critical PromptPwnd Vulnerability Exposes AI-Powered GitLab, GitHub Pipelines Cybercrime

Critical PromptPwnd Vulnerability Exposes AI-Powered GitLab, GitHub Pipelines

A critical vulnerability, identified as "PromptPwnd," affects AI agents that are integrated into the GitLab CI/CD and GitHub Actions pipelines....
Redazione RHC - 9 December 2025
LLM-Powered Malware: The Future of Autonomous Cyber Threats Cybercrime

LLM-Powered Malware: The Future of Autonomous Cyber Threats

Researchers at Netskope Threat Labs have just published a new analysis on the possibility of creating autonomous malware built exclusively...
Redazione RHC - 9 December 2025
Intellexa Exploits Zero-Day Vulnerabilities with Spyware Cybercrime

Intellexa Exploits Zero-Day Vulnerabilities with Spyware

Despite significant geopolitical challenges, the mercenary spyware industry remains a resilient and persistent threat; in this context, the well-known vendor...
Redazione RHC - 8 December 2025

The phenomenon of polarization on the internet: Hikikomori

Many still maintain that hikikomori is an exclusively Japanese phenomenon. Yet, scientifically, numerous studies now confirm the existence of cases similar in characteristics to Japanese hikikomori in Spain, France, Italy,...
Share on Facebook Share on LinkedIn Share on X

From Likes to Depression: How Social Media Can Affect Our Mental Health

Questioning changes as they occur is always a difficult, if not downright foolhardy, undertaking. Certainly, when the object of the investigation concerns the changes social media has wrought on individuals,...
Share on Facebook Share on LinkedIn Share on X

The US and Global Surveillance: Uncovering Section 702 of the Foreign Intelligence Surveillance Act

Privacy in the United States is a constant topic of debate, especially in the digital age. The Supreme Court has played a central role in interpreting the Fourth Amendment, which...
Share on Facebook Share on LinkedIn Share on X

What is Cross-Site Scripting? An article to help you understand it in a simple way.

Author : Davide Cavallini Today I will try to use the same dialectic ( as previously done in the article on SQL injection ), and explain in a simple way...
Share on Facebook Share on LinkedIn Share on X

Spy Apps: How Spyware Works and Why It’s a Privacy Risk

Spyware (also known as spy apps) represent one of the most insidious and dangerous threats of the digital age. These are malicious programs designed to infiltrate a user's device, collecting...
Share on Facebook Share on LinkedIn Share on X

Asus releases emergency firmware update for vulnerable DSL routers.

Asus has released an emergency firmware update for several DSL router models. The patch addresses a critical vulnerability that allows attackers to take complete control of devices without authentication. The...
Share on Facebook Share on LinkedIn Share on X

Nuclear power entirely in the hands of AI! And what if there’s an accident?

In the technological field, the idea that the future development of generating systems depends inexorably on the expansion of nuclear capacity is taking root, pushing the sector's players to identify...
Share on Facebook Share on LinkedIn Share on X

Veeam Analysis: Ransomware Payments Decline, But Data Resilience Remains Critical for EMEA Enterprises

Beyond backup: Businesses need cyber resilience, data portability, secure cloud storage, and hybrid cloud protection . Data from the Veeam Ransomware Trends Reports 2024 and 2025 shows that the number...
Share on Facebook Share on LinkedIn Share on X

The History of GPS: The History of Satellite Navigation

It's amazing how far we've come with satellite navigation in the last 40 years. GPS (Global Positioning System) is one of the most useful things to have ever come out...
Share on Facebook Share on LinkedIn Share on X

Tor Browser 15.0.1: Critical Vulnerability Fixes and Improvements

The Tor Project has released Tor Browser 15.0.1 , fixing critical security vulnerabilities inherited from Firefox 140.5.0esr. This maintenance release offers essential protections for privacy-conscious users who rely on anonymous...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoinnovation
Red Hot Cyber and Hack The Box: together for the CTF at the RHC 2026 conference
Redazione RHC - 21/01/2026

In the Italian and European cybersecurity landscape, few collaborations manage to combine educational vision, technical realism, and community impact as effectively as the partnership announced between Red Hot Cyber and Hack The Box (HTB) for…

Immagine del sitoCybercrime
Everest Ransomware Attacks McDonald’s, 861GB Data Stolen
Redazione RHC - 21/01/2026

Yesterday, the Everest cybercriminal gang claimed responsibility for a cyberattack on McDonald’s on their Data Leak Site (DLS) . From the gang’s post, the cybercriminals claim to have 861GB of data exfiltrated from the company’s…

Immagine del sitoCybercrime
ESXi Zero-Day Exploit: How to Protect Your VMware Environment
Redazione RHC - 20/01/2026

A group of attackers is using a zero-day exploit toolkit to compromise VMware ESXi instances in an uncontrolled manner, taking advantage of multiple vulnerabilities to bypass virtual machine restrictions. The current incident highlights the ongoing…

Immagine del sitoCybercrime
Google Fast Pair Vulnerability: WhisperPair Exposes Millions of Devices
Redazione RHC - 19/01/2026

Researchers from the Cybersecurity and Industrial Cryptography team at KU Leuven have discovered a critical flaw in the Google Fast Pair protocol. The vulnerability allows attackers to hijack control of millions of Bluetooth devices, track…

Immagine del sitoCybercrime
Elon Musk Sues OpenAI for $134 Billion Over AI Betrayal
Redazione RHC - 19/01/2026

Elon Musk has filed a staggering $134 billion in damages in a malicious lawsuit against OpenAI and Microsoft. According to Bloomberg , the latest lawsuit accuses OpenAI of betraying its core mission as a nonprofit…