Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Hackers don’t want to save you: they want to erase you.
Di Redazione RHC - 21/09/2025

Hackers are increasingly targeting backups – not systems or servers, but the data that companies retain for a limited period of time so they can recover from attacks. A new study from Apricorn revea...

Two Scattered Spider activists found guilty of TfL cyber attack
Di Redazione RHC - 19/09/2025

Two young men involved in the Scattered Spider group have been charged as part of the National Crime Agency investigation into a cyber attack on Transport for London (TfL). On August 31, 2024, TfL was...

Will this latest article “against” ChatControl be absolutely useless?
Di Stefano Gazzella - 18/09/2025

We had already discussed the proposed “ChatControl” regulation almost two years ago, but given the roadmap currently underway, we find ourselves embarrassed to have to discuss it again. It feels l...

RHC interviews ShinyHunters: “Systems can be repaired, but people remain vulnerable!”
Di RHC Dark Lab - 17/09/2025

ShinyHunters is a group of threat actors that gained notoriety after the massive data breach against Salesforce, an incident that led Google to closely monitor them and assign them the code name UNC62...

The Great Firewall in the Spotlight: The Leak Revealing the Industrialization of Chinese Censorship
Di Redazione RHC - 16/09/2025

Edited by Luca Stivali and Olivia Terragni. On September 11, 2025, what can be defined as the largest leak ever suffered by the Great Firewall of China (GFW) exploded in the media, massively and massi...

PureVPN on Linux: Researcher Finds Security and Anonymity Issues

An independent researcher named Andreas, who runs the blog Anagogistis , has discovered serious vulnerabilities in Pure VPN's Linux clients that compr...
Redazione RHC - 22/09/2025 - 21:12

Ally Solos AI Glasses for the Visually Impaired: Autonomy and Safety

Envision’s Ally Solos AI glasses are a breath of fresh air for people with visual impairments, helping them read , orient themselves and understand th...
Redazione RHC - 22/09/2025 - 19:45

When Unicode Becomes a Weapon and Your Email Betrays You, Inboxfuscation Arrives

Attackers are increasingly using Microsoft Exchange inbox capabilities to ensure persistence and steal sensitive information within corporate networks...
Redazione RHC - 22/09/2025 - 18:46

Scattered Spider: The teenage genius who hacked Las Vegas is in custody.

A series of high-profile attacks on the Las Vegas gambling industry in 2023 has now reached its final phase. Several major casinos have been victims o...
Redazione RHC - 22/09/2025 - 18:02

Cyberattacks on European airports: ENISA identifies ransomware

The European Union Agency for Information Security (ENISA) has announced that it has identified the type of ransomware responsible for the serious dis...
Redazione RHC - 22/09/2025 - 16:56

First malware with integrated GPT-4 discovered: MalTerminal arrives

SentinelLABS researchers have discovered what they describe as the first known example of malware with integrated LLM functionality , dubbed MalTermin...
Redazione RHC - 22/09/2025 - 15:52
1 2 3 155

PureVPN on Linux: Researcher Finds Security and Anonymity Issues

- September 22nd, 2025

An independent researcher named Andreas, who runs the blog Anagogistis , has discovered serious vulnerabilities in Pure VPN's Linux clients that compromise basic anonymity and traffic security. The issues affect...

  

Ally Solos AI Glasses for the Visually Impaired: Autonomy and Safety

- September 22nd, 2025

Envision’s Ally Solos AI glasses are a breath of fresh air for people with visual impairments, helping them read , orient themselves and understand their surroundings without the constant assistance...

  

When Unicode Becomes a Weapon and Your Email Betrays You, Inboxfuscation Arrives

- September 22nd, 2025

Attackers are increasingly using Microsoft Exchange inbox capabilities to ensure persistence and steal sensitive information within corporate networks. Inboxfuscation , developed by Permiso, is a framework that demonstrates how attackers...

  

Scattered Spider: The teenage genius who hacked Las Vegas is in custody.

- September 22nd, 2025

A series of high-profile attacks on the Las Vegas gambling industry in 2023 has now reached its final phase. Several major casinos have been victims of sophisticated network intrusions. The...

  

Cyberattacks on European airports: ENISA identifies ransomware

- September 22nd, 2025

The European Union Agency for Information Security (ENISA) has announced that it has identified the type of ransomware responsible for the serious disruptions that paralyzed several European airports, including Berlin,...

  

First malware with integrated GPT-4 discovered: MalTerminal arrives

- September 22nd, 2025

SentinelLABS researchers have discovered what they describe as the first known example of malware with integrated LLM functionality , dubbed MalTerminal . The discovery was presented at LABScon 2025 ,...

  

Sign up for the newsletter