Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Fortinet 320x100px
Banner Ransomfeed 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

What is Cross-Site Scripting? An article to help you understand it in a simple way. Cybercrime

What is Cross-Site Scripting? An article to help you understand it in a simple way.

Author : Davide Cavallini Today I will try to use the same dialectic ( as previously done in the article...
Davide Cavallini - 17 November 2025
Spy Apps: How Spyware Works and Why It’s a Privacy Risk Cybercrime

Spy Apps: How Spyware Works and Why It’s a Privacy Risk

Spyware (also known as spy apps) represent one of the most insidious and dangerous threats of the digital age. These...
Redazione RHC - 17 November 2025
Asus releases emergency firmware update for vulnerable DSL routers. Cybercrime

Asus releases emergency firmware update for vulnerable DSL routers.

Asus has released an emergency firmware update for several DSL router models. The patch addresses a critical vulnerability that allows...
Redazione RHC - 17 November 2025
Nuclear power entirely in the hands of AI! And what if there’s an accident? Cybercrime

Nuclear power entirely in the hands of AI! And what if there’s an accident?

In the technological field, the idea that the future development of generating systems depends inexorably on the expansion of nuclear...
Redazione RHC - 17 November 2025
Veeam Analysis: Ransomware Payments Decline, But Data Resilience Remains Critical for EMEA Enterprises Cybercrime

Veeam Analysis: Ransomware Payments Decline, But Data Resilience Remains Critical for EMEA Enterprises

Beyond backup: Businesses need cyber resilience, data portability, secure cloud storage, and hybrid cloud protection . Data from the Veeam...
Redazione RHC - 17 November 2025
The History of GPS: The History of Satellite Navigation Culture

The History of GPS: The History of Satellite Navigation

It's amazing how far we've come with satellite navigation in the last 40 years. GPS (Global Positioning System) is one...
Redazione RHC - 17 November 2025

Taiwan launches international initiative for submarine cable safety

On October 28, 2025, during the Taiwan-EU Submarine Cable Safety Cooperation Forum held in Taipei, Taiwanese Foreign Minister Lin Chia-lung introduced the "International Initiative for Submarine Cable Risk Management" ,...
Share on Facebook Share on LinkedIn Share on X

Port scanning in 2025: Nmap and AI — how to integrate them securely and operationally

In 2025, port scanning remains a key activity for both Red Teams (reconnaissance, discovery, fingerprinting) and Blue Teams (monitoring and proactive defense). But the latest development is the arrival of...
Share on Facebook Share on LinkedIn Share on X

The Louvre Theft: When Thieves Taught the World the Physical Pen Test

The event that shook the world on October 19, 2025, was not a natural disaster or a financial collapse, but the sensational theft of Napoleon's jewels from the Louvre Museum....
Share on Facebook Share on LinkedIn Share on X

Starting November 12th, age verification for porn sites will be implemented in Italy. What’s changing?

Starting Tuesday, November 12, 2025, new provisions from the Italian Communications Regulatory Authority (AGCOM) will come into force, requiring an age verification system for accessing pornographic websites. The measure, provided...
Share on Facebook Share on LinkedIn Share on X

AzureHound: The “Legitimate” Tool for Cloud Attacks

AzureHound, part of the BloodHound suite, was born as an open-source tool to help security teams and red teams identify vulnerabilities and escalation paths in Microsoft Azure and Entra ID...
Share on Facebook Share on LinkedIn Share on X

Red Hot Cyber launches free real-time CVE Enrichment service

Timeliness is key in cybersecurity. Red Hot Cyber recently launched a completely free service that allows IT professionals, security analysts, and enthusiasts to monitor the most critical vulnerabilities published in...
Share on Facebook Share on LinkedIn Share on X

Going 50 Years Without Charging Your Phone: Here’s the Chinese Battery That Will Change Everything

Beijing-based Betavolt claims to have developed a nuclear battery that represents the world's first achievement in the miniaturization of atomic energy. This innovation involves integrating 63 nuclear isotopes into a...
Share on Facebook Share on LinkedIn Share on X

Mossad, the rigged supply chain, and intimidated judges

Yossi Cohen, former director of the Mossad, has said publicly two things that usually remain locked away in a room without tape recorders. First, Israel allegedly deployed a global sabotage...
Share on Facebook Share on LinkedIn Share on X

Nvidia invests $1 billion in Nokia to develop 6G networks with AI

Jen-Hsun Huang dropped a bombshell: Nvidia has reportedly invested $1 billion in Nokia. Yes, Nokia is the company that made Symbian phones so popular 20 years ago. In his speech,...
Share on Facebook Share on LinkedIn Share on X

Windows 11 Task Manager Bug: How to Fix It

Microsoft's Windows 11 updates often contain unexplained bugs, especially patches for new features, such as the recently released KB5067036 . While KB5067036 is an optional update, it introduced a completely...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Webrat Malware Targets Security Researchers with GitHub Exploit Traps
Redazione RHC - 24/12/2025

There’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…

Immagine del sitoCybercrime
A backdoor in NVIDIA code. Three 9.8 bugs plague AI and robotics development systems
Redazione RHC - 24/12/2025

When it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…

Immagine del sitoCybercrime
La Poste Hit by Pro-Russian DDoS Attack During Peak Holiday Season
Redazione RHC - 23/12/2025

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…

Immagine del sitoVulnerability
CVE-2025-47761: FortiClient VPN Zero-Day Exploit Lets Privilege Escalation
Manuel Roccon - 23/12/2025

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…

Immagine del sitoCybercrime
Critical MongoDB Vulnerability Exposed: CVE-2025-14847
Redazione RHC - 23/12/2025

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…