Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Redhotcyber Banner Sito 320x100px Uscita 101125
970x20 Itcentric

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

AI Browser Attack: Google Drive Wiper Threat Exposed Cybercrime

AI Browser Attack: Google Drive Wiper Threat Exposed

Researchers at Striker STAR Labs have described a new agent-based browser attack that can turn a regular email into a...
Redazione RHC - 6 December 2025
NATO Cyber Coalition Exercise: Enhancing Cyber Defense with 1,300 Experts Cybercrime

NATO Cyber Coalition Exercise: Enhancing Cyber Defense with 1,300 Experts

NATO held its largest-ever cyber defense exercise, Cyber Coalition, in Estonia, involving approximately 1,300 specialists . The goal was to...
Redazione RHC - 6 December 2025
Microsoft 365 Price Hike: What You Need to Know About the 2026 Increase Cybercrime

Microsoft 365 Price Hike: What You Need to Know About the 2026 Increase

Starting July 1, 2026, Microsoft 365 and Office 365 subscription prices for business and government customers will increase by 8%...
Redazione RHC - 6 December 2025
React2Shell Vulnerability Exploited by China-Linked Hackers, Patch Now Cybercrime

React2Shell Vulnerability Exploited by China-Linked Hackers, Patch Now

We often discuss on this site that the window between the publication of an exploit and the launch of active...
Redazione RHC - 6 December 2025
FreeBSD 15.0: Discover the Power of This Unix-like Operating System Cybercrime

FreeBSD 15.0: Discover the Power of This Unix-like Operating System

Behind many of the digital applications and services we take for granted every day lies a silent giant: FreeBSD ....
Redazione RHC - 6 December 2025
Cloudflare Blocks AI Bots: The Future of Internet Economy at Stake Cybercrime

Cloudflare Blocks AI Bots: The Future of Internet Economy at Stake

Since July 1st, Cloudflare has blocked 416 billion requests from artificial intelligence bots attempting to extract content from its customers'...
Redazione RHC - 5 December 2025

Quishing: What it is, how it works, and how to protect yourself

Quishing is an emerging form of cyberattack that combines traditional phishing with the use of QR codes , tools now familiar to many. The term " quishing " is a...
Share on Facebook Share on LinkedIn Share on X

Password Managers: A Complete Guide to Choosing and Using Them

Passwords: how important are they in our digital lives? How many times have we reported this on our pages? Most digital activities— from social media to banking to online shopping...
Share on Facebook Share on LinkedIn Share on X

Discovering the NIS2 Directive: Security and Resilience of Digital Systems in the European Union

On 10 November 2022, the European Parliament, by a large majority, approved the NIS2 (Network and Information System Security) Directive with its publication in the Official Journal of the European...
Share on Facebook Share on LinkedIn Share on X

Kraken Arrives: The New Ransomware That Assesses Your Environment to Inflict Maximum Damage

Cisco Talos researchers have detected an active wave of attacks using a new ransomware called Kraken. The group began operating in February 2025 and uses double-extortion methods, without targeting specific...
Share on Facebook Share on LinkedIn Share on X

North Korea reorganizes its intelligence with a new agency

North Korea has restructured its intelligence hierarchy, transforming the former Intelligence Agency into a structure with a much broader mandate. The new body, called the General Intelligence Directorate (GIRD), brings...
Share on Facebook Share on LinkedIn Share on X

Cognitive Biases and Cybersecurity: The Fatal Fallacy of “I Have Nothing to Hide”

In Italy, over 3,000 people lose their lives on the roads every year, despite everyone knowing basic safety rules. In cybercrime, the scenario isn't all that different: millions of victims...
Share on Facebook Share on LinkedIn Share on X

Did they give you a digital photo frame? It’s more than just family memories.

Researchers have discovered several critical vulnerabilities in Uhale digital picture frames running Android , with some models even downloading and executing malware during startup. They examined the Uhale app and...
Share on Facebook Share on LinkedIn Share on X

What are PsyOps? Exploring mind manipulation in the digital age.

Psychological operations, commonly known as PsyOps, are a significant and often poorly understood element of military and security strategy . These operations involve the use of psychological tactics to influence...
Share on Facebook Share on LinkedIn Share on X

Understanding Firewalls: The First Line of Defense in Cybersecurity

In the world of cybersecurity, firewalls are the first line of defense against cyber threats and attacks. Every day, businesses and home users are exposed to risks such as malware,...
Share on Facebook Share on LinkedIn Share on X

Critical Vulnerability in FortiWeb: Fortinet and CISA Recommend Urgent Updates

Fortinet has confirmed the discovery of a critical relative path vulnerability (CWE-23) in FortiWeb devices, identified as CVE-2025-64446 and registered as IR Number FG-IR-25-910 . The flaw, published on November...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Microsoft Copilot Vulnerability Exposes User Data to Hackers
Redazione RHC - 15/01/2026

A recently fixed vulnerability allowed attackers to exploit Microsoft Copilot Personal with a single click to steal sensitive user data. Using a phishing link, attackers were able to take control of sessions without requiring further…

Immagine del sitoCybercrime
Progress Software Patches LoadMaster, MOVEit WAF Vulnerabilities
Redazione RHC - 15/01/2026

On January 12, 2026, Progress Software Corporation released patches that address two high-severity Command Injection vulnerabilities, which could allow remote attackers to execute malicious code on LoadMaster load balancers and MOVEit Web Application Firewalls (WAFs).…

Immagine del sitoCybercrime
24-Year-Old Hacker Breaches US Supreme Court Database
Redazione RHC - 14/01/2026

Do you remember the 24-year-old hacker Carmelo Miano and the breaches of the Naples Prosecutor’s Office’s accounts and computer systems? It appears something similar happened in the United States, and the other young man is…

Immagine del sitoCybercrime
Cloudflare vs Italy: The Battle for Internet Freedom and DNS Control
Redazione RHC - 14/01/2026

Cloudflare CEO Matthew Prince has threatened to shut down the company’s operations in Italy after the country’s telecom regulator fined it twice its annual revenue in the country. The facts The conflict erupted around Italy’s…

Immagine del sitoCybercrime
Cybercrime Meets Real-Life Violence: Foxtrot Network’s Dark Side
Redazione RHC - 13/01/2026

In recent months, there has been increasing talk of a paradigm shift in cybercrime . What for years was perceived as a predominantly digital ecosystem— consisting of fraud, identity theft, online extortion, and cyberattacks —is…