Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Crowdstrike 320×100
HackTheBox 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

WhatsApp Blocked in Russia: Messaging App Faces Crackdown Cybercrime

WhatsApp Blocked in Russia: Messaging App Faces Crackdown

The Russian Federation's Roskomnadzor has announced that it continues to impose systematic restrictions on the messaging app WhatsApp due to...
Redazione RHC - 28 November 2025
CEO Scam: How to Protect Your Company from Business Email Compromise Cybercrime

CEO Scam: How to Protect Your Company from Business Email Compromise

This morning, Paragon Sec was contacted by an Italian company that had been the victim of a new fraud attempt...
Redazione RHC - 28 November 2025
Shai-Hulud Worm Spreads Beyond npm, Attacks Maven Cybercrime

Shai-Hulud Worm Spreads Beyond npm, Attacks Maven

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected...
Redazione RHC - 28 November 2025
11.7% of jobs could be replaced by artificial intelligence Cybercrime

11.7% of jobs could be replaced by artificial intelligence

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory:...
Redazione RHC - 28 November 2025
The market for “controlling” people is taking off on the Dark Web. Cybercrime

The market for “controlling” people is taking off on the Dark Web.

BI.ZONE experts analyzed over 3,500 advertisements on darknet platforms offering dossiers on specific individuals, known as "probiv" (finding). One in...
Redazione RHC - 28 November 2025
God is in the Cloud: They Hacked Your Brain and You Liked It Cybercrime

God is in the Cloud: They Hacked Your Brain and You Liked It

We're in the age of paid deception. Your every click is a private referendum in which they, the algorithms, always...
Fabrizio Saviano - 28 November 2025

Malware is a ticking time bomb! The threat to Siemens S7 PLCs begins in 2027.

Researchers discovered several libraries in the public NuGet registry containing code that will be activated in 2027 and 2028. The infected packages target three popular .NET data storage engines (Microsoft...
Share on Facebook Share on LinkedIn Share on X

The Illicit Distribution of Intimate Images: A Threat to Women’s Freedom

This is the fourth in a series of articles analyzing gender-based violence in the digital context, in anticipation of November 25, the International Day for the Elimination of Violence against...
Share on Facebook Share on LinkedIn Share on X

Vault7 with a Chinese twist: China’s secret global surveillance system exposed

Only the flag changes, but the result is always the same. In 2017, WikiLeaks published Vault7 , a leak that exposed the CIA's arsenal: toolkits for penetrating smartphones, smart TVs,...
Share on Facebook Share on LinkedIn Share on X

Whisper Leak: The New Side-Channel Attack That Steals Messages with LLMs

Microsoft has announced a new side-channel attack on remote language models. It allows a passive attacker, capable of viewing encrypted network traffic, to use artificial intelligence to determine the topic...
Share on Facebook Share on LinkedIn Share on X

QNAP fixes 7 critical NAS bugs discovered at Pwn2Own Ireland 2025

QNAP has fixed seven critical zero-day vulnerabilities in its Network Attached Storage (NAS) operating systems after a group of researchers successfully exploited them at Pwn2Own Ireland 2025 , held in...
Share on Facebook Share on LinkedIn Share on X

Artificial intelligence surpasses humans, but not in every field. Is AGI near or far away?

According to experts, humanity has entered a new stage in the development of artificial intelligence: an era in which systems no longer simply assist humans , but are able to...
Share on Facebook Share on LinkedIn Share on X
Tecno-ottimismo VS potere del controllo IA

Techno-optimism vs. the power of control: are we the greatest threat from AI?

Imagine a futuristic city split in half: on one side, glittering towers of innovation; on the other, chaos and the shadows of lost control. This isn't a dystopian vision, but...
Share on Facebook Share on LinkedIn Share on X

Google Gemini 3.0: New features and updates for the year’s most anticipated AI assistant

Over the past week, Google announced that the Gemini Assistant can now natively integrate YouTube and Google Maps services without the need to use specific commands like "@YouTube" or "@Google...
Share on Facebook Share on LinkedIn Share on X

Domestic robots and privacy: the hidden price of the automated future

The home of the future is full of robots. Automated laundries, personal assistants, and small electronic housekeepers are all devices designed to free up precious time and make domestic life...
Share on Facebook Share on LinkedIn Share on X

The tale of the Mayor who thought of banning axes… but then came the Saws

Once upon a time, there was a town that had a Magical Forest. It was happy to have it, even a little proud. Which is why all the citizens willingly...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Undertow Vulnerability CVE-2025-12543 Exposes Java Ecosystem to Critical Security Risks
Redazione RHC - 09/01/2026

A flaw has been discovered in the foundation of the Java web ecosystem. Undertow , the high-performance web server that powers enterprise heavyweights like WildFly and JBoss EAP , has been hit by a critical…

Immagine del sitoCybercrime
Iran Protests Escalate as Reza Pahlavi Calls for Action Against Government
Redazione RHC - 09/01/2026

Iranian protesters chanted and marched through the streets until Friday morning, following a call from exiled former Prince Reza Pahlavi to demonstrate, despite the Iranian theocracy cutting off the country from the internet and international…

Immagine del sitoCybercrime
Veeam Backup Vulnerability: Critical RCE Flaw Discovered – Update Now
Redazione RHC - 08/01/2026

Backups are generally considered the last line of defense, but this week Veeam reminded us that backup systems themselves can become entry points for attacks. The company released security updates for Backup & Replication ,…

Immagine del sitoCybercrime
When Attack Discovery Becomes Automated, Detection Stops Scaling
Alexander Rogan - 08/01/2026

For much of the past two decades, cybersecurity has been built on a simple assumption: malicious activity can be detected, analysed, and responded to before meaningful damage occurs. This assumption shaped everything from SOC design…

Immagine del sitoCybercrime
CVE-2026-21858: n8n Vulnerability Exposes Thousands of Servers to RCE
Redazione RHC - 08/01/2026

The vulnerability, identified as CVE-2026-21858, which we recently reported on, affects approximately 100,000 servers worldwide, threatening to expose proprietary API keys, customer databases, and AI workflows. The vulnerability, with a CVSS score of 10, has…