Welcome to Red Hot Cyber | Cybersecurity News
Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
UtiliaCS 320x100
Redhotcyber Banner Sito 970x120px Uscita 101125

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Autonomous Warfare: China Unveils Smart Tanks That Fight Alone

The People's Liberation Army (PLA) has announced a shift in ground forces tactics, from traditional close-quarters tank combat to long-range,...
Redazione RHC - 15 October 2025

A new phishing campaign on NPM involves 175 malicious packages.

Attackers are abusing the legitimate npm infrastructure in a new phishing campaign on Beamglea. This time, the malicious packages don't...
Redazione RHC - 15 October 2025

We’re All in the Truman Show! Cybersecurity Lessons from Seahaven Cyber Prison

The 1998 film "The Truman Show" is a terrifying premonition of the dangers of pervasive surveillance, algorithmic manipulation, and the...
Daniela Farina - 14 October 2025

AI Alignment: Where Does AI Learn Right and Wrong?

The other day on LinkedIn, I found myself having a conversation with someone who was seriously interested in the topic...
Sergio Corpettini - 14 October 2025

Microsoft Patch Tuesday: 175 vulnerabilities fixed and two zero-days exploited

In its latest update, the tech giant fixed 175 vulnerabilities affecting its core products and underlying systems, including two actively...
Redazione RHC - 14 October 2025

Microsoft warns about uncontrolled use of ‘shadow’ AI in the workplace

While Microsoft actively promotes its Copilot tools for businesses, the company also warns of the dangers of uncontrolled use of...
Redazione RHC - 14 October 2025

Open Data and Big Data: Data Management and a Comparison of Hadoop vs. Spark

Today, for all large companies, data represents a strategic resource of primary importance. Thanks to the information obtained, it is possible to establish decision-making strategies that, in every sector, can...
Share on Facebook Share on LinkedIn Share on X

Trend Micro: Beware of the “Task Scam,” the scam targeting online job seekers.

The latest research from the security leader reveals the fraudulent mechanisms behind fake job opportunities offered by digital platforms The number of victims of the "Task scam" is increasing worldwide,...
Share on Facebook Share on LinkedIn Share on X

Palo Alto Networks Also Compromised via Salesforce and Drift

In early September 2025, Palo Alto Networks confirmed it had been the victim of a data breach. The compromise did not affect its core products or services, but rather some...
Share on Facebook Share on LinkedIn Share on X

The Battle Between OnlyFans and Google: Piracy, AI, and the Chaos of Automated Copyright

The massive clash between adult content creators and pirates, now transferred to automated copyright protection systems, is beginning to radically change the face of the Internet. Every day, it becomes...
Share on Facebook Share on LinkedIn Share on X

Was there terror on Ursula von der Leyen’s flight? Let’s clear things up!

On August 31, 2025, flight AAB53G, operated by a Dassault Falcon 900LX registered OO-GPE and carrying European Commission President Ursula von der Leyen, took off from Warsaw and landed safely...
Share on Facebook Share on LinkedIn Share on X

Video Surveillance Under Attack: A Hikvision Bug Allows Admin Access Without a Login

At the end of August 2025, a high-impact vulnerability affecting HikCentral Professional, the Hikvision platform used to centrally manage video surveillance and access control, was disclosed. The flaw, classified as...
Share on Facebook Share on LinkedIn Share on X

Nearly a third of web traffic is generated by bots! The era of invasive AI is now

Yesterday, the Red Hot Cyber website was inaccessible for about an hour. But what's going on, we wondered? After a series of analyses, here's the result: the internet is changing...
Share on Facebook Share on LinkedIn Share on X

Lazarus APT: 3 Advanced RATs for Cryptocurrency Financial Organizations

Recently, an advanced subgroup linked to the notorious threat actor Lazarus was detected distributing three different remote access Trojans (RATs) within compromised financial and cryptocurrency organizations. Initial access was achieved...
Share on Facebook Share on LinkedIn Share on X

Zscaler Data Breach: Lessons Learned About the Evolution of SaaS Threats

Zscaler's recent confirmation of a data breach resulting from a supply chain attack provides a case study in the evolution of threats against complex SaaS ecosystems. The attack, attributed to...
Share on Facebook Share on LinkedIn Share on X

Zscaler Suffers Data Breach: Supply Chain Attack Via Salesloft Drift

A large-scale cyberattack has targeted security firm Zscaler, which has officially confirmed it was the victim of a supply chain breach. This attack exposed customer contact data due to compromised...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sito
DIG AI: The Dark Web’s New AI Tool for Cybercrime
Redazione RHC - 21/12/2025

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…

Immagine del sito
Airbus Eyes Sovereign Cloud to Mitigate US Data Risks
Redazione RHC - 21/12/2025

In recent months, a question has been emerging with increasing insistence on European corporate boards: is the US cloud really safe for all companies? Especially for those operating in strategic sectors or with economic, industrial,…

Immagine del sito
North Korean Hackers Steal $2 Billion in Crypto, Targeting DeFi Sector
Redazione RHC - 21/12/2025

In 2025, North Korean hackers stole a record $2 billion in cryptocurrency , 51% more than the previous year. However, the number of attacks has decreased, while the damage has increased. According to Chainalysis, North…

Immagine del sito
Linux Kernel CVE-2025-68260 Vulnerability Fixed: Rust Code at Risk
Redazione RHC - 19/12/2025

The world of technology is a veritable battlefield, where coding geniuses challenge malicious attackers every day with exploits and security patches. That’s why the recent discovery of a vulnerability in the Linux kernel has caused…

Immagine del sito
HPE OneView Vulnerability CVE-2025-37164: Critical Security Update Required
Redazione RHC - 18/12/2025

Cybersecurity is a serious issue, especially when it comes to vulnerabilities that can compromise an entire system. Well, Hewlett Packard Enterprise (HPE) has just raised the alarm about a truly worrying security flaw in its…