Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Crowdstrike 320×100
Banner Ransomfeed 970x120 1

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12309 articoli, 10915 italiano, 1394 inglese)12309 articoli
10915 italiano, 1394 inglese

The editorial team of Red Hot Cyber consists of a group of individuals and anonymous sources who actively collaborate to provide early information and news on cybersecurity and computing in general.

Ultimi articoli di Redazione RHC

ATMs targeted! Cybersecurity experts reveal an attack campaign targeting ATMs.
Group-IB experts presented a detailed analysis of the long-running UNC2891 campaign, which demonstrated the continuing sophistication of ATM attack sc...
Google Gemini Improves AI-Generated Image Verification
Google has expanded the capabilities of its Gemini artificial intelligence service by adding a tool to the app and web version to check images for sig...
“We Want to Hack You Again!” NSO Group Rejects WhatsApp’s Pegasus Lawsuit
Israeli company NSO Group has appealed a California federal court ruling that bars it from using WhatsApp’s infrastructure to distribute its Pegasus...
Oracle under attack: Pre-auth RCE vulnerability discovered that compromises entire systems
A vulnerability, designated CVE-2025-61757, was made public by Searchlight Cyber last Thursday. Company researchers discovered the issue and notified ...
CrowdStrike Insider Fired for Providing Sensitive Data to Criminal Hackers
In recent months, the insider problem has become increasingly important for large companies , and one recent episode involved CrowdStrike. The cyberse...
Sysmon will finally be integrated into Windows 11 and Windows Server 2025 in 2026
Microsoft has announced that it will integrate the popular Sysmon tool directly into Windows 11 and Windows Server 2025 in 2026. The announcement was ...
Sneaky2FA: The phishing scam that steals credentials with browser-in-the-browser attacks
Push Security specialists have noticed that the Sneaky2FA phishing platform now supports browser-in-the-browser attacks, which allow the creation of f...
TamperedChef: Malware via Fake App Installers
The large-scale TamperedChef campaign is once again attracting the attention of specialists, as attackers continue to distribute malware via fake inst...
Whoever took down Cloudflare during the outage put their infrastructure at risk
A major outage in Cloudflare’s infrastructure has unexpectedly tested the robustness of the cloud and its security systems for many businesses. On N...
Critical Vulnerability in Azure Bastion Scores 10! When RDP and SSH in the Cloud Are Checkmated
An authentication bypass vulnerability has been discovered in Azure Bastion , Microsoft’s managed service that enables secure RDP and SSH connection...
Risk averted for millions of Microsoft users! The critical vulnerability in Microsoft SharePoint 9.8
Microsoft has disclosed a critical vulnerability in SharePoint Online (discovered by RHC through our ongoing monitoring of critical CVEs on our portal...
Sturnus, the banking Trojan that intercepts WhatsApp, Telegram, and Signal messages
ThreatFabric specialists have discovered a new banking Trojan, Sturnus . The malware is capable of intercepting messages from end-to-end encrypted mes...
Disloyal Employees: Fired, Returns to Work, and Resets 2,500 Passwords Without the Company’s Knowledge
An employee has pleaded guilty to hacking into his former employer’s network and causing nearly $1 million in damages after being fired. According t...
Critical vulnerability in the WordPress plugin W3 Total Cache. 430,000 sites at risk!
A critical vulnerability, CVE-2025-9501, has been discovered in the popular WordPress plugin W3 Total Cache . This vulnerability allows the execution ...
Hundreds of robots on the march: China presents the new generation of humanoids
Shenzhen -based UBTECH Robotics has publicly demonstrated its new wave of humanoid robots, delivering several hundred of them in a single shipment. Th...
Veeam launches Data Platform v13, redefining the standard for cyber resilience and advanced data protection.
With new capabilities to stay ahead of threats and accelerate recovery with next-generation security, forensic insights and intelligent automation, Ve...
Happy birthday, Windows! 40 years of operating system history and still going strong.
Exactly 40 years ago, on November 20, 1985, Microsoft released Windows 1.0 , the first version of Windows, which attempted to transform the then-perso...
Huawei unveils HarmonyOS and the new HM740 laptop. Is Microsoft Office at risk?
On November 19, Huawei presented the latest developments in its HarmonyOS line for the office sector during a technical meeting with institutional par...
Meta and Google suspend construction of two undersea cables due to instability in the Red Sea
Meta and Google have been forced to postpone several major undersea internet cable projects, including 2Africa and Blue-Raman , in the Red Sea corrido...
Let the hunt begin! Critical 7-Zip bug puts millions of users at risk.
Millions of users are exposed to the risk of malware infections and system compromise due to hackers’ active exploitation of a critical remote code ...