Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Ancharia Mobile 1
HackTheBox 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

ChatGPT to Introduce Targeted Ads, Changing Monetization Strategy Cybercrime

ChatGPT to Introduce Targeted Ads, Changing Monetization Strategy

Until now, ChatGPT has been ad-free: no banners, no hidden promotions. Even the paid versions worked without pushy offers. But...
Redazione RHC - 29 November 2025
GitLab Security Updates Fix High-Severity Vulnerabilities CVE-2024-9183 Cybercrime

GitLab Security Updates Fix High-Severity Vulnerabilities CVE-2024-9183

GitLab has released critical security updates for its Community Edition (CE) and Enterprise Edition (EE) to address several high-severity vulnerabilities...
Redazione RHC - 29 November 2025
Apache SkyWalking Vulnerability Exposes Users to XSS Attacks Cybercrime

Apache SkyWalking Vulnerability Exposes Users to XSS Attacks

A vulnerability was recently discovered in Apache SkyWalking , a popular application performance monitoring tool, that attackers could exploit to...
Redazione RHC - 29 November 2025
Bloody Wolf Attacks Central Asia with NetSupport RAT via Java Exploits Cybercrime

Bloody Wolf Attacks Central Asia with NetSupport RAT via Java Exploits

Group-IB specialists have recorded new attacks by the Bloody Wolf hacker group, which has been targeting Kyrgyzstan since June 2025...
Redazione RHC - 29 November 2025
WhatsApp Blocked in Russia: Messaging App Faces Crackdown Cybercrime

WhatsApp Blocked in Russia: Messaging App Faces Crackdown

The Russian Federation's Roskomnadzor has announced that it continues to impose systematic restrictions on the messaging app WhatsApp due to...
Redazione RHC - 28 November 2025
CEO Scam: How to Protect Your Company from Business Email Compromise Cybercrime

CEO Scam: How to Protect Your Company from Business Email Compromise

This morning, Paragon Sec was contacted by an Italian company that had been the victim of a new fraud attempt...
Redazione RHC - 28 November 2025

Roblox: The Platform That Puts Children’s Safety at Risk

With over 100 million daily active users , Roblox attracts countless children around the world. Nearly half of its audience is under 13, and in Australia, young players spend an...
Share on Facebook Share on LinkedIn Share on X

The Origins of UNIX: The Original Bell Labs Tape Resurfaces from Utah

A rare find from the early days of Unix may take researchers back to the very origins of the operating system. A magnetic tape labeled " UNIX Original From Bell...
Share on Facebook Share on LinkedIn Share on X

21 Years of Firefox: A History of Innovation and Independence

November 9th marked the 21st anniversary of Firefox 1.0. In 2004, it was the first stable release of Mozilla's new browser, which quickly positioned itself as a simple and secure...
Share on Facebook Share on LinkedIn Share on X

Hyundai subsidiary HAEA data breach: Sensitive information at risk

HAEA, a subsidiary of South Korean Hyundai Motor Group and headquartered in California, USA, provides customized IT solutions and services for the automotive industry, particularly to Hyundai and Kia subsidiaries....
Share on Facebook Share on LinkedIn Share on X

Malware is a ticking time bomb! The threat to Siemens S7 PLCs begins in 2027.

Researchers discovered several libraries in the public NuGet registry containing code that will be activated in 2027 and 2028. The infected packages target three popular .NET data storage engines (Microsoft...
Share on Facebook Share on LinkedIn Share on X

The Illicit Distribution of Intimate Images: A Threat to Women’s Freedom

This is the fourth in a series of articles analyzing gender-based violence in the digital context, in anticipation of November 25, the International Day for the Elimination of Violence against...
Share on Facebook Share on LinkedIn Share on X

Vault7 with a Chinese twist: China’s secret global surveillance system exposed

Only the flag changes, but the result is always the same. In 2017, WikiLeaks published Vault7 , a leak that exposed the CIA's arsenal: toolkits for penetrating smartphones, smart TVs,...
Share on Facebook Share on LinkedIn Share on X

Whisper Leak: The New Side-Channel Attack That Steals Messages with LLMs

Microsoft has announced a new side-channel attack on remote language models. It allows a passive attacker, capable of viewing encrypted network traffic, to use artificial intelligence to determine the topic...
Share on Facebook Share on LinkedIn Share on X

QNAP fixes 7 critical NAS bugs discovered at Pwn2Own Ireland 2025

QNAP has fixed seven critical zero-day vulnerabilities in its Network Attached Storage (NAS) operating systems after a group of researchers successfully exploited them at Pwn2Own Ireland 2025 , held in...
Share on Facebook Share on LinkedIn Share on X

Artificial intelligence surpasses humans, but not in every field. Is AGI near or far away?

According to experts, humanity has entered a new stage in the development of artificial intelligence: an era in which systems no longer simply assist humans , but are able to...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Instagram Data Leak Exposes 17.5 Million Users on Dark Web
Redazione RHC - 10/01/2026

A massive digital archive containing the private information of approximately 17.5 million Instagram users appears to have fallen into the hands of cybercriminals. A few hours ago, the alarm was raised after several Reddit users…

Immagine del sitoCybercrime
Undertow Vulnerability CVE-2025-12543 Exposes Java Ecosystem to Critical Security Risks
Redazione RHC - 09/01/2026

A flaw has been discovered in the foundation of the Java web ecosystem. Undertow , the high-performance web server that powers enterprise heavyweights like WildFly and JBoss EAP , has been hit by a critical…

Immagine del sitoCybercrime
Iran Protests Escalate as Reza Pahlavi Calls for Action Against Government
Redazione RHC - 09/01/2026

Iranian protesters chanted and marched through the streets until Friday morning, following a call from exiled former Prince Reza Pahlavi to demonstrate, despite the Iranian theocracy cutting off the country from the internet and international…

Immagine del sitoCybercrime
Veeam Backup Vulnerability: Critical RCE Flaw Discovered – Update Now
Redazione RHC - 08/01/2026

Backups are generally considered the last line of defense, but this week Veeam reminded us that backup systems themselves can become entry points for attacks. The company released security updates for Backup & Replication ,…

Immagine del sitoCybercrime
When Attack Discovery Becomes Automated, Detection Stops Scaling
Alexander Rogan - 08/01/2026

For much of the past two decades, cybersecurity has been built on a simple assumption: malicious activity can be detected, analysed, and responded to before meaningful damage occurs. This assumption shaped everything from SOC design…