Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Crowdstrike 320×100
TM RedHotCyber 970x120 042543

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

The phenomenon of polarization on the internet: Hikikomori

Many still maintain that hikikomori is an exclusively Japanese phenomenon. Yet, scientifically, numerous studies now confirm the existence of cases...
Daniela Farina - 17 November 2025

From Likes to Depression: How Social Media Can Affect Our Mental Health

Questioning changes as they occur is always a difficult, if not downright foolhardy, undertaking. Certainly, when the object of the...
Daniela Farina - 17 November 2025

The US and Global Surveillance: Uncovering Section 702 of the Foreign Intelligence Surveillance Act

Privacy in the United States is a constant topic of debate, especially in the digital age. The Supreme Court has...
Aniello Giugliano - 17 November 2025

What is Cross-Site Scripting? An article to help you understand it in a simple way.

Author : Davide Cavallini Today I will try to use the same dialectic ( as previously done in the article...
Davide Cavallini - 17 November 2025

Spy Apps: How Spyware Works and Why It’s a Privacy Risk

Spyware (also known as spy apps) represent one of the most insidious and dangerous threats of the digital age. These...
Redazione RHC - 17 November 2025

Asus releases emergency firmware update for vulnerable DSL routers.

Asus has released an emergency firmware update for several DSL router models. The patch addresses a critical vulnerability that allows...
Redazione RHC - 17 November 2025

Windows 7 Shrinks to 69MB: A Minimalist’s Achievement

Windows minimalists have set another record. Enthusiast @XenoPanther has reduced the size of a running copy of Windows 7 to 69 megabytes , smaller than the average mobile app. By...
Share on Facebook Share on LinkedIn Share on X

Robots are starting to take their place in society thanks to new AI algorithms.

On September 25, Google DeepMind released a video demonstrating how its humanoid platforms handle multi-step, everyday tasks using multimodal reasoning. In a series of demonstrations, the machines confidently performed sequences...
Share on Facebook Share on LinkedIn Share on X

Google Android Protects Users from Fraud, But Watch Out on Mondays

Google has shared new data on Android's built-in protections against text and call fraud. According to the company, the system blocks over 10 billion suspicious contacts each month , in...
Share on Facebook Share on LinkedIn Share on X

OpenAI may have lost $12 billion in its latest fiscal quarter.

Microsoft's financial report indicates that OpenAI may have lost $12 billion in its latest fiscal quarter. An expense in Microsoft's earnings report (517.81, -7.95, -1.51%) surprised analysts: a $4.1 billion...
Share on Facebook Share on LinkedIn Share on X

Android Malware Steals NFC-Enabled Credit Cards

In Eastern European countries, there has been a rapid increase in malicious Android apps that exploit contactless data transfer technology to steal credit cards. According to Zimperium, over 760 programs...
Share on Facebook Share on LinkedIn Share on X

Le Security Operations al tempo dell’Artificial Intelligence

By Vicki Vinci, SOC Architect - International at Fortinet The most significant technological trend of recent years is undoubtedly the advent of Artificial Intelligence, especially its generative component (GenAI). Putting...
Share on Facebook Share on LinkedIn Share on X

The race for cybersecurity has begun and Italy is running with its shoes tied

In recent years, cybersecurity has risen to the top of the agendas of businesses, institutions, and public administration. But if we look at the numbers, Italy still seems to be...
Share on Facebook Share on LinkedIn Share on X

Taiwan launches international initiative for submarine cable safety

On October 28, 2025, during the Taiwan-EU Submarine Cable Safety Cooperation Forum held in Taipei, Taiwanese Foreign Minister Lin Chia-lung introduced the "International Initiative for Submarine Cable Risk Management" ,...
Share on Facebook Share on LinkedIn Share on X

Port scanning in 2025: Nmap and AI — how to integrate them securely and operationally

In 2025, port scanning remains a key activity for both Red Teams (reconnaissance, discovery, fingerprinting) and Blue Teams (monitoring and proactive defense). But the latest development is the arrival of...
Share on Facebook Share on LinkedIn Share on X

The Louvre Theft: When Thieves Taught the World the Physical Pen Test

The event that shook the world on October 19, 2025, was not a natural disaster or a financial collapse, but the sensational theft of Napoleon's jewels from the Louvre Museum....
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sito
A backdoor in NVIDIA code. Three 9.8 bugs plague AI and robotics development systems
Redazione RHC - 24/12/2025

When it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…

Immagine del sito
La Poste Hit by Pro-Russian DDoS Attack During Peak Holiday Season
Redazione RHC - 23/12/2025

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…

Immagine del sito
CVE-2025-47761: FortiClient VPN Zero-Day Exploit Lets Privilege Escalation
Manuel Roccon - 23/12/2025

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…

Immagine del sito
Critical MongoDB Vulnerability Exposed: CVE-2025-14847
Redazione RHC - 23/12/2025

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…

Immagine del sito
RansomHouse Ransomware Upgraded: Enhanced Encryption Threat
Redazione RHC - 22/12/2025

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…