Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Crowdstrike 320×100
UtiliaCS 970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Shai-Hulud Attack: npm Supply Chain Compromised Again Cybercrime

Shai-Hulud Attack: npm Supply Chain Compromised Again

The npm ecosystem is once again at the center of a large-scale supply chain attack attributed to the Shai-Hulud campaign....
Redazione RHC - 30 November 2025
ChatGPT to Introduce Targeted Ads, Changing Monetization Strategy Cybercrime

ChatGPT to Introduce Targeted Ads, Changing Monetization Strategy

Until now, ChatGPT has been ad-free: no banners, no hidden promotions. Even the paid versions worked without pushy offers. But...
Redazione RHC - 29 November 2025
GitLab Security Updates Fix High-Severity Vulnerabilities CVE-2024-9183 Cybercrime

GitLab Security Updates Fix High-Severity Vulnerabilities CVE-2024-9183

GitLab has released critical security updates for its Community Edition (CE) and Enterprise Edition (EE) to address several high-severity vulnerabilities...
Redazione RHC - 29 November 2025
Apache SkyWalking Vulnerability Exposes Users to XSS Attacks Cybercrime

Apache SkyWalking Vulnerability Exposes Users to XSS Attacks

A vulnerability was recently discovered in Apache SkyWalking , a popular application performance monitoring tool, that attackers could exploit to...
Redazione RHC - 29 November 2025
Bloody Wolf Attacks Central Asia with NetSupport RAT via Java Exploits Cybercrime

Bloody Wolf Attacks Central Asia with NetSupport RAT via Java Exploits

Group-IB specialists have recorded new attacks by the Bloody Wolf hacker group, which has been targeting Kyrgyzstan since June 2025...
Redazione RHC - 29 November 2025
WhatsApp Blocked in Russia: Messaging App Faces Crackdown Cybercrime

WhatsApp Blocked in Russia: Messaging App Faces Crackdown

The Russian Federation's Roskomnadzor has announced that it continues to impose systematic restrictions on the messaging app WhatsApp due to...
Redazione RHC - 28 November 2025

The world of software vulnerabilities: how they’re exploited, who creates them, and how to protect yourself.

Software vulnerabilities pose a threat to cybersecurity because hackers can exploit them to gain access to computer systems. A software vulnerability is a flaw in software that can be used...
Share on Facebook Share on LinkedIn Share on X

Exploring Cyberspace: States and Wars Without Geographic Borders

The concept of cyber risk is increasingly becoming mainstream. Cybersecurity is a rapidly evolving field. But to help you understand the broader context of what we now call cyberspace, between...
Share on Facebook Share on LinkedIn Share on X

Who invented the World Wide Web? The story of Timothy Berners-Lee, the genius behind the web

We all use the internet every day, at all hours, our smartphone has become an active prosthesis of our body, but have we ever wondered who invented the World Wide...
Share on Facebook Share on LinkedIn Share on X

Marketing is nothing! VPNs sell themselves every time a government blocks adult sites

Hundreds of millions of smartphone users have faced blocking of pornographic websites and mandatory age verification. The UK has introduced mandatory identity verification on adult websites , and similar laws...
Share on Facebook Share on LinkedIn Share on X

Hackers: Who They Are, What They Do, and Their Role in Today’s World

The meaning of " hacker " has deep roots. It derives from the English "to hack," meaning to chip away, cut, strike, or cut. It's a powerful image, that of...
Share on Facebook Share on LinkedIn Share on X

The First Hackers in History: Hacking Is a Journey, Not a Destination

The word hacking comes from the English verb “to hack,” which means “to damage.” Today, with this short article, I will tell you a piece of the history of hacking,...
Share on Facebook Share on LinkedIn Share on X

The extraordinary story of Alan Turing, the father of computer science: from his tumultuous childhood to his revolutionary contributions

Madras, early 1900s. The British Empire dominates India. Julius, a history graduate from Oxford University, serves as a colonial administrative clerk in the Indian Civil Service. He and his wife,...
Share on Facebook Share on LinkedIn Share on X
Evoluzione-da-wep-a-wpa-3

Wi-Fi Security: The Evolution from WEP to WPA3 and Self-Defending Networks

From the weaknesses of WEP to the advances of WPA3 , Wi-Fi network security has come a long way. Today, self-defending networks represent the new frontier: intelligent systems capable of...
Share on Facebook Share on LinkedIn Share on X

The Windows 98 Blue Screen of Death That Changed Microsoft’s Plans

It was April 20, 1998. Microsoft was so embarrassed by the iconic Windows 98 blue screen of death on stage that it decided to change plans for building a new...
Share on Facebook Share on LinkedIn Share on X

Roblox: The Platform That Puts Children’s Safety at Risk

With over 100 million daily active users , Roblox attracts countless children around the world. Nearly half of its audience is under 13, and in Australia, young players spend an...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Veeam Backup Vulnerability: Critical RCE Flaw Discovered – Update Now
Redazione RHC - 08/01/2026

Backups are generally considered the last line of defense, but this week Veeam reminded us that backup systems themselves can become entry points for attacks. The company released security updates for Backup & Replication ,…

Immagine del sitoCybercrime
When Attack Discovery Becomes Automated, Detection Stops Scaling
Alexander Rogan - 08/01/2026

For much of the past two decades, cybersecurity has been built on a simple assumption: malicious activity can be detected, analysed, and responded to before meaningful damage occurs. This assumption shaped everything from SOC design…

Immagine del sitoCybercrime
CVE-2026-21858: n8n Vulnerability Exposes Thousands of Servers to RCE
Redazione RHC - 08/01/2026

The vulnerability, identified as CVE-2026-21858, which we recently reported on, affects approximately 100,000 servers worldwide, threatening to expose proprietary API keys, customer databases, and AI workflows. The vulnerability, with a CVSS score of 10, has…

Immagine del sitoCybercrime
Disable Windows 11 AI Features Easily with RemoveWindowsAI Tool
Redazione RHC - 07/01/2026

A new open-source script allows Windows 11 users to widely disable the operating system’s built-in artificial intelligence features . The project, developed by Zoicware , is called RemoveWindowsAI and aims to offer greater control over…

Immagine del sitoCybercrime
DevSecOps: Integrating Security into Your Development Process
Massimiliano Brolli - 07/01/2026

When it comes to application security, there’s rarely a single problem. It’s almost always a chain of small flaws, poor decisions, and missing controls that, when added together, pave the way for serious incidents. This…