Welcome to Red Hot Cyber | Cybersecurity News
Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Ransomfeed 320x100 1
Fortinet 970x120px

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Let’s discover injections explained in a simple way

Good morning everyone. I'm Davide Cavallini, a web developer and penetration tester. Today I'm going to talk about injections. There...
Davide Cavallini - 15 November 2025

A journey into the world of OT/ICS: What are SCADA servers?

The world of OT (Operational Technology) and ICS (Industrial Control Systems) is closely related to SCADA (Supervisory Control and Data...
Redazione RHC - 15 November 2025

Quishing: What it is, how it works, and how to protect yourself

Quishing is an emerging form of cyberattack that combines traditional phishing with the use of QR codes , tools now...
Redazione RHC - 15 November 2025

Password Managers: A Complete Guide to Choosing and Using Them

Passwords: how important are they in our digital lives? How many times have we reported this on our pages? Most...
Redazione RHC - 15 November 2025

Discovering the NIS2 Directive: Security and Resilience of Digital Systems in the European Union

On 10 November 2022, the European Parliament, by a large majority, approved the NIS2 (Network and Information System Security) Directive...
Riccardo Nuti - 15 November 2025

Kraken Arrives: The New Ransomware That Assesses Your Environment to Inflict Maximum Damage

Cisco Talos researchers have detected an active wave of attacks using a new ransomware called Kraken. The group began operating...
Redazione RHC - 15 November 2025

Hikvision Exploiter: The open-source tool for attacking IP cameras

A new open-source tool, known as HikvisionExploiter, was recently updated. This tool is designed to automate cyberattacks against vulnerable Hikvision IP cameras . Designed to facilitate penetration testing operations, this...
Share on Facebook Share on LinkedIn Share on X

100 Infostealer packages uploaded to NPM using AI hallucinations

Since August 2024, the PhantomRaven campaign has uploaded 126 malicious packages to npm, which have been downloaded a total of over 86,000 times . The campaign was discovered by Koi...
Share on Facebook Share on LinkedIn Share on X

Atroposia: The MaaS platform that provides a Trojan with a vulnerability scanner

Varonis researchers have discovered the Atroposia MaaS (malware-as-a-service) platform. For $200 a month, its customers receive a remote access Trojan with extensive functionality, including remote desktop, file system management, information...
Share on Facebook Share on LinkedIn Share on X

0day as weapons: sold 8 US defense 0day exploits to Moscow

Peter Williams, a former employee of the defense contractor, pleaded guilty in US federal court to two counts of theft of trade secrets, admitting to selling eight zero-day vulnerabilities to...
Share on Facebook Share on LinkedIn Share on X

Critical vulnerability in Blink: a website can block all Chromium-based browsers

Researcher José Pino has presented a proof-of-concept vulnerability in the Blink rendering engine used in Chromium -based browsers, demonstrating how a single web page can crash many popular browsers and...
Share on Facebook Share on LinkedIn Share on X

Trump-Xi Summit: A Truce That Doesn’t Benefit Europe

After years of tensions, tariffs, mutual accusations, and trade wars that have shattered the global balance of power, the long-awaited meeting between Donald Trump and Xi Jinping has finally taken...
Share on Facebook Share on LinkedIn Share on X

Cloud yes or Cloud no: When the Digital Sky Darkens

The outage of Microsoft's cloud services, which occurred just hours before the release of its quarterly results, is just the latest in a long series of outages that are exposing...
Share on Facebook Share on LinkedIn Share on X

Taiwan: Up to 7 years in prison for those who damage undersea cables

Taipei, October 30, 2025 – Taiwan’s Legislative Yuan Economic Commission has approved the first reading of a series of amendments to the so-called “Seven Submarine Cable Laws,” introduced to address...
Share on Facebook Share on LinkedIn Share on X

95% of companies believe they’re ready for ransomware. But only 15% actually are!

Companies' widespread confidence in their cyber resilience is facing a new wave of threats, this time from artificial intelligence. According to the OpenText Cybersecurity 2025 Report, 95% of organizations worldwide...
Share on Facebook Share on LinkedIn Share on X

Cyber Incident Management in the NIS2 Era

The NIS 2 Decree (Legislative Decree 138/2024), effective October 16, 2024, implements the principles of the European NIS2 Directive, laying the foundation for a more complex operational model of collaboration...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sito
DIG AI: The Dark Web’s New AI Tool for Cybercrime
Redazione RHC - 21/12/2025

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…

Immagine del sito
Airbus Eyes Sovereign Cloud to Mitigate US Data Risks
Redazione RHC - 21/12/2025

In recent months, a question has been emerging with increasing insistence on European corporate boards: is the US cloud really safe for all companies? Especially for those operating in strategic sectors or with economic, industrial,…

Immagine del sito
North Korean Hackers Steal $2 Billion in Crypto, Targeting DeFi Sector
Redazione RHC - 21/12/2025

In 2025, North Korean hackers stole a record $2 billion in cryptocurrency , 51% more than the previous year. However, the number of attacks has decreased, while the damage has increased. According to Chainalysis, North…

Immagine del sito
Linux Kernel CVE-2025-68260 Vulnerability Fixed: Rust Code at Risk
Redazione RHC - 19/12/2025

The world of technology is a veritable battlefield, where coding geniuses challenge malicious attackers every day with exploits and security patches. That’s why the recent discovery of a vulnerability in the Linux kernel has caused…

Immagine del sito
HPE OneView Vulnerability CVE-2025-37164: Critical Security Update Required
Redazione RHC - 18/12/2025

Cybersecurity is a serious issue, especially when it comes to vulnerabilities that can compromise an entire system. Well, Hewlett Packard Enterprise (HPE) has just raised the alarm about a truly worrying security flaw in its…