Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
UtiliaCS 320x100
HackTheBox 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Human Washing Machine Launched: Japan’s Science Unveils Unique Device Cybercrime

Human Washing Machine Launched: Japan’s Science Unveils Unique Device

Japanese company Science has launched a washing machine for humans. The 2.30-meter-long capsule bathes a person in 15 minutes and...
Redazione RHC - 1 December 2025
Brazilian Systems Targeted in Sophisticated OAST Exploit Campaign Cybercrime

Brazilian Systems Targeted in Sophisticated OAST Exploit Campaign

Security researchers have discovered a sophisticated exploit campaign that leverages a private out-of-band application security testing (OAST) service hosted on...
Redazione RHC - 1 December 2025
Australian Man Jailed for Evil Twin Wi-Fi Scam Targeting Airline Passengers Cybercrime

Australian Man Jailed for Evil Twin Wi-Fi Scam Targeting Airline Passengers

An Australian court has convicted a 44-year-old man who stole the personal data of airline passengers and airport visitors over...
Redazione RHC - 1 December 2025
KrakenBite Phishing Service Exposed Cybercrime

KrakenBite Phishing Service Exposed

The underground cybercrime market continues to evolve rapidly, fueled by specialized groups designing and selling tools for increasingly sophisticated digital...
Redazione RHC - 1 December 2025
ADC Aerospace Hit by Play Ransomware Attack, Data Breach Feared Cybercrime

ADC Aerospace Hit by Play Ransomware Attack, Data Breach Feared

American aviation and defense components manufacturer ADC Aerospace has found itself in the spotlight due to a possible cyber attack...
Redazione RHC - 1 December 2025
Microsoft 365 Security Risk: Interface Poisoning Attacks Cybercrime

Microsoft 365 Security Risk: Interface Poisoning Attacks

This article analyzes the disclosure submitted to Microsoft and available in English on digitaldefense , where images, demonstration videos and...
Massimiliano Dal Cero - 1 December 2025

Open WiFi Networks: A Fertile Ground for Cybercrime

Nowadays, the proliferation of portable, wearable, and other smart devices has made data exchange, access to resources, and web browsing indispensable. This in-depth look at Wi-Fi focuses on a widely...
Share on Facebook Share on LinkedIn Share on X

Midnight Ransomware: A free decryptor has been released thanks to a bug in the code.

Researchers have discovered a vulnerability in the new Midnight ransomware , based on the old Babuk source code. The malware is marketed as an "advanced" version of the malware, but...
Share on Facebook Share on LinkedIn Share on X

NetScaler ADC and Gateway Vulnerable: Urgent Updates to Prevent XSS Attacks

NetScaler and Citrix - On November 11, 2025, released security bulletin CTX695486 regarding the CVE-2025-12101 vulnerability, which affects the NetScaler ADC and NetScaler Gateway products. The vulnerability is rated "...
Share on Facebook Share on LinkedIn Share on X

LLM: Wikipedia Parasites: The Importance of Humanity in the Age of Artificial Intelligence

In the age of rapid advances in artificial intelligence, Wikipedia's importance as a reliable source of knowledge has become particularly significant. While neural networks generate text, images, and videos, their...
Share on Facebook Share on LinkedIn Share on X

The Accident That Liberated Generative AI. An Analysis of the “Plane Crash” Prompt

A plane crashes in a snowy forest. Some of the passengers survive, others do not. The survivors are starving, desperate, and find refuge in a village cut off from the...
Share on Facebook Share on LinkedIn Share on X

OWASP Top 10 2025: New Web Application Threats, Supply Chain Top Three

After four years, OWASP has updated its TOP 10 list of the most dangerous web application risks, adding two new categories and revising the ranking structure. The organization has released...
Share on Facebook Share on LinkedIn Share on X

The dark web isn’t selling your data. You’re the one putting it up for sale every day!

Unfortunately, personal data is a highly attractive and valuable market for cybercriminals, for reasons that are not at all difficult to imagine . We're not just talking about scams or...
Share on Facebook Share on LinkedIn Share on X

Attack Techniques: What is a Command and Control (C2) Server?

Among the many strategies used by attackers, one of the most insidious is represented by Command and Control (C2) Servers. We often discuss them on the pages of RHC, but...
Share on Facebook Share on LinkedIn Share on X

New Penetration Testing Methods: Adversary Emulation and the Importance of a Non-Technological Approach to Corporate Security

In the ever-evolving digital world, cybersecurity threats are becoming increasingly sophisticated and pervasive. Companies in every industry face a growing challenge in protecting their sensitive data and customer information. In...
Share on Facebook Share on LinkedIn Share on X

Cyber Incident Mitigation Guide: The First Steps

By definition, a security incident occurs when a computer system, network, or the data contained within them is compromised, breached, or damaged by malicious or unauthorized activity. These incidents can...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Internet Shutdowns Cost $19.7B in 2025, Sophisticated Censorship Rises
Redazione RHC - 11/01/2026

Imagine a situation where the internet appears to be working, but websites won’t open beyond the first screen, messaging apps are intermittent, and businesses are constantly changing. According to the authors of a recent annual…

Immagine del sitoCybercrime
Instagram Data Leak Exposes 17.5 Million Users on Dark Web
Redazione RHC - 10/01/2026

A massive digital archive containing the private information of approximately 17.5 million Instagram users appears to have fallen into the hands of cybercriminals. A few hours ago, the alarm was raised after several Reddit users…

Immagine del sitoCybercrime
Undertow Vulnerability CVE-2025-12543 Exposes Java Ecosystem to Critical Security Risks
Redazione RHC - 09/01/2026

A flaw has been discovered in the foundation of the Java web ecosystem. Undertow , the high-performance web server that powers enterprise heavyweights like WildFly and JBoss EAP , has been hit by a critical…

Immagine del sitoCybercrime
Iran Protests Escalate as Reza Pahlavi Calls for Action Against Government
Redazione RHC - 09/01/2026

Iranian protesters chanted and marched through the streets until Friday morning, following a call from exiled former Prince Reza Pahlavi to demonstrate, despite the Iranian theocracy cutting off the country from the internet and international…

Immagine del sitoCybercrime
Veeam Backup Vulnerability: Critical RCE Flaw Discovered – Update Now
Redazione RHC - 08/01/2026

Backups are generally considered the last line of defense, but this week Veeam reminded us that backup systems themselves can become entry points for attacks. The company released security updates for Backup & Replication ,…