Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Red Hot Cyber Academy

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Palo Alto Networks Also Compromised via Salesforce and Drift
Di Antonio Piazzolla - 02/09/2025

In early September 2025, Palo Alto Networks confirmed it had been the victim of a data breach. The compromise did not affect its core products or services, but rather some internally used Salesforce i...

Was there terror on Ursula von der Leyen’s flight? Let’s clear things up!
Di Giovanni Pollola - 02/09/2025

On August 31, 2025, flight AAB53G, operated by a Dassault Falcon 900LX registered OO-GPE and carrying European Commission President Ursula von der Leyen, took off from Warsaw and landed safely at Plov...

Zscaler Data Breach: Lessons Learned About the Evolution of SaaS Threats
Di Ada Spinelli - 02/09/2025

Zscaler’s recent confirmation of a data breach resulting from a supply chain attack provides a case study in the evolution of threats against complex SaaS ecosystems. The attack, attributed to the A...

Critical Linux Vulnerability: CVSS 8.5 Vulnerability Discovered in UDisks Daemon
Di Redazione RHC - 01/09/2025

A critical security flaw in the Linux UDisks daemon was recently discovered, allowing potential unprivileged attackers to access files belonging to highly privileged users. The vulnerability, classifi...

Let the hunt begin! Hackers exploit Citrix flaw to infiltrate global systems
Di Redazione RHC - 30/08/2025

A critical zero-day flaw, classified as CVE-2025-6543, has been discovered in Citrix NetScaler systems. This vulnerability has been actively exploited by malicious hackers since May 2025, several mont...

AI browser extensions? There’s too much uncertainty: the risk still lies in user awareness!
Cybercrime and Darknet

AI browser extensions? There’s too much uncertainty: the risk still lies in user awareness!

Anthropic has raised the alarm about a new threat related to "smart" browser extensions: Websites can infiltrate hidden commands that an AI agent will...
Redazione RHC - 29/08/2025 - 10:21
Little engineers for big robots! Is Italy also focusing on young people?
Cybercrime and Darknet

Little engineers for big robots! Is Italy also focusing on young people?

In Stavropol, Russian Federation, the race for the regional robotics championship for younger students has officially begun. Applications can be submi...
Redazione RHC - 29/08/2025 - 10:11
Phishing on Teams: at least the hacker responds faster than the real help desk!
Cybercrime and Darknet

Phishing on Teams: at least the hacker responds faster than the real help desk!

In recent months, as previously reported on Red Hot Cyber, a new front has emerged in the corporate phishing landscape: Microsoft Teams attacks in whi...
Redazione RHC - 29/08/2025 - 09:02
It’s a global cyber shock! Beijing’s 007s are infiltrating and compromising the world’s Internet backbones.
Cybercrime and Darknet

It’s a global cyber shock! Beijing’s 007s are infiltrating and compromising the world’s Internet backbones.

The United States and several allied countries have issued a joint warning about a growing cyber offensive conducted by actors sponsored by the People...
Redazione RHC - 29/08/2025 - 08:42
Submarine cables are vulnerable! New strategies are needed.
Cybercrime and Darknet

Submarine cables are vulnerable! New strategies are needed.

Researchers from Reichman University (Israel) have detailed in an article in the journal Nature Electronics the growing risks and threats posed by nat...
Redazione RHC - 28/08/2025 - 20:54
Popular password managers, including LastPass, 1Password, and Bitwarden, are vulnerable to clickjacking.
Cybercrime and Darknet

Popular password managers, including LastPass, 1Password, and Bitwarden, are vulnerable to clickjacking.

A security expert has discovered that six of the most popular password managers, used by tens of millions of people, are vulnerable to clickjacking, a...
Redazione RHC - 28/08/2025 - 17:56
1 8 9 10 11 12 122

GitHub and GitLab are increasingly under fire! Targeted attacks targeting developers via fake repositories

- August 31st, 2025

By hosting fake projects on popular development platforms (GitHub and GitLab), attackers trick users into running malicious payloads that pull add-ons from a hacker-controlled repository. As a result, remote access...

  

Meta’s AI bots use avatars of minors and celebrities: a storm erupts.

- August 31st, 2025

Meta found itself at the center of a scandal after a Reuters investigation revealed that AI-powered chatbots that mimicked celebrities were being distributed on the company's platforms. These virtual characters,...

  

Sindoor Dropper: The Malware Using the India-Pakistan Clash to Infect Linux

- August 31st, 2025

An insidious malware attack known as "Sindoor Dropper" targets Linux operating systems, leveraging sophisticated spear-phishing methods and a complex, multi-stage infection process. The insidious operation targets users with lures related...

  

Iranian cyber attacks disrupt Gaza ceasefire negotiations

- August 31st, 2025

Mediation efforts led by Arab nations to secure the release of Israelis held by Hamas and a ceasefire in Gaza have been interrupted by cyber attacks from Iran, a cybersecurity...

  

Sign up for the newsletter