Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320×100
Enterprise BusinessLog 970x120 1

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Nessun autore trovato con i filtri selezionati.

Ultimi articoli di Redazione RHC

Microsoft 365 Under Attack: How Hackers Use Direct Send to Send Phishing Emails
A sophisticated phishing campaign that targeted over 70 organizations by exploiting Microsoft 365’s Direct Send feature. The campaign, which began i...
Warning! WinRAR: Critical Vulnerability That Could Run Malware
WinRAR developers have fixed a Directory Traversal vulnerability, which has been assigned the identifier CVE-2025-6218. Under certain circumstances, t...
He died because of ransomware! Another victim joins the list
This is not the first time that a cyber attack has resulted in the loss of human lives.We had already discussed it in the article “I deferichò per ...
A new fileless infostealer is being spread by Telegram and legitimate services
TLP: AMBERAnalyst: Agostino Pellegrino, Crescenzo Cuoppolo, Alessio BandiniLast revision date: 2025-06-24 This forensic technical report documents the...
Citrix: New Critical Vulnerability from 9.2 Affects NetScaler – Attacks Underway!
Citrix has reported a new critical vulnerability in its NetScaler appliances, already actively exploited by attackers. The problem is identified with ...
Fox Kitten and Br0k3r: The Iranian Cyber Contractor Collaborating with Ransomware Gangs
We continue our series of articles on IABs by writing about an Iranian cyber contractor that not only works as an initial access broker but also provi...
REvil: Sentenced but then set free. The most controversial court case ever
Do you remember the infamous REvil cyber gang? The Russian hacker group responsible for some of the most devastating ransomware attacks in the early d...
Shock in France: the gentlemen of BreachForums were twenty-year-old French citizens!
Shocking news in France: one of the largest global cybercrime networks dismantled. The BreachForum hackers were… French. French authorities have bus...
Zero-Click Attack on Notepad++. HackerHood Tested the Exploit and It Really Works with Little
A dangerous vulnerability has been discovered in the latest version of the popular text editor Notepad++ that allows an attacker togain complete contr...
22,000 Sites At Risk: New Motors WordPress Vulnerability Allows Total Hacking
Attackers are actively exploiting a critical privilege escalation vulnerability in the WordPress Motors theme, allowing them to hijack administrator...
Qilin & Associates Law Firm: Ransomware Hires Lawyers, Launches “Intimidation Package”
The developers of the Qilin ransomware (recently interviewed by us) offered their partners the help and advice of a team of lawyers, so that they coul...
US-Iran Cyberwar: DHS Raises Alarm, American Networks Under Attack
The United States has warned of possible cyber attacks by pro-Iranian groups following a series of airstrikes against Iranian nuclear facilities, as p...
“Jailbreak as a Service” is Coming: 60 Euros a Month to Purchase Cybercrime-Ready AI Systems
According to a report by Cato Networks, cybercriminals continue to actively use LLM patterns in their attacks. Specifically, we are talking about ve...
$200 for Access to an Italian Company! While the Dark Web is doing business, are you ready to defend yourself?
Following the case of the 568 endpoints of an Italian industrial machinery company, another compromised access related to an Italian software enginee...
“Cleaning Up” Windows Update! Microsoft Declares War on Drivers Exploited in Ransomware Attacks
Microsoft announced that it will periodically remove outdated drivers from the Windows Update Catalog to reduce risk and improve compatibility. “T...
Cyberspazio: il filo invisibile tra guerra e pace
Cyberspace: The Invisible Thread Between War and Peace
How Iran-Israel’s Digital War Redefines Security, Diplomacy, and the Global Future? Since June 12, a 700% increase in cyber activity has been detect...
Kill Switch! Donald Trump’s Digital Weapon Threatening Europe
Donald Trump’s return to the White House has becomea painful reminder for Europe of its main digital vulnerability: the “kill switch” effectivel...
Cloudflare Mitigates 7.3 Terabits Per Second Attack. Imagine 9350 HD Movies Downloaded in 45 Seconds
In mid-May 2025, Cloudflare blocked the largest DDoS attack ever recorded: 7.3 terabits per second (Tbps). This event comes shortly after the release ...
Myth: If I use a VPN, I am completely safe even on open and unsecured WiFi networks
Many believe that using a VPN guarantees total protection while browsing, even on completely open and unsafe WiFi networks. Although VPNs are effectiv...
Your VPN is a Trojan! Here are 17 Free Apps Made in China That Spy on You While Google and Apple Get Fat
“If you don’t pay for the service, you are the product. This is true for social networks, but also for free VPNs: your data, your privacy, is ofte...