Welcome to Red Hot Cyber | Cybersecurity News
Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Mobile
Banner Ransomfeed 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

12 security bugs discovered in Ivanti Endpoint Manager (EPM). Update now!

Ivanti has published 13 vulnerabilities in its Endpoint Manager (EPM) software , including two high-severity flaws that could allow remote...
Redazione RHC - 14 October 2025

A PNG containing a Trojan. Astaroth persistently abuses GitHub.

McAfee researchers have reported new activity by the Astaroth banking trojan , which has started using GitHub as a persistent...
Redazione RHC - 14 October 2025

Satellites targeted! Thousands of phone conversations and text messages intercepted.

Satellite communications links used by government agencies, the military, businesses, and mobile operators have been discovered to be the source...
Redazione RHC - 14 October 2025

Internet Explorer is “dead,” but it continues to infect PCs with its bugs via Edge

While Internet Explorer has officially been out of support since June 2022, Microsoft recently faced a threat that exploited Internet...
Luca Galuppi - 14 October 2025

Nanochat: Create your own LLM, train it, and get it running on your PC for $100

Developer Andrej Karpathy has unveiled nanochat , a minimalist, fully open-source version of ChatGPT that can be trained and run...
Redazione RHC - 14 October 2025

Jeff Bezos at Italian Tech Week: “Millions of people will live in space.”

Data centers in space, lunar landers, Martian missions: the future designed by Bezos in Turin. But the real revelation is...
Carlo Denza - 14 October 2025

The new cybersecurity battlefield? Your brain!

Welcome to the first installment of our series, a three-week journey exploring the extraordinary dance between coevolution, cybersecurity, and the humanities, with a focus on coaching. Each week, we'll tackle...
Share on Facebook Share on LinkedIn Share on X

Wikipedia under the US Congress’s scrutiny: when freedom of expression becomes “under special surveillance”

On August 27, 2025, the Wikimedia Foundation, which operates Wikipedia, received an official letter from the Committee on Oversight and Government Reform of the United States House of Representatives.The letter,...
Share on Facebook Share on LinkedIn Share on X

From AI chatbots to global data theft: The Drift flaw rocks Google Workspace.

Last week, it emerged that criminal hackers had compromised the sales automation platform Salesloft and stolen OAuth and update tokens from customers in its AI agent Drift, designed to integrate...
Share on Facebook Share on LinkedIn Share on X

Confidentiality vs. Privacy: The Concept Everyone Confuses (and Why It’s Dangerous)

Every day we hear about privacy in every aspect of our lives, so much so that the term has entered common parlance. But what does it really mean? What happens...
Share on Facebook Share on LinkedIn Share on X

Tea Dating App Data Breach: 72,000 Images and Over 1 Million Private Messages

The "Tea Dating Advice" app reported a data breach on July 25, 2025, involving 72,000 images of users registered before February 2024, including 13,000 selfies and documents uploaded for account...
Share on Facebook Share on LinkedIn Share on X

Artificial consciousness: abroad it’s science, in Italy it’s taboo.

Abroad, it's already a recognized field of study, but here it's almost taboo: a journey through science, philosophy, and ethical perspectives. 1. The Great Italian Absentee In Italy, artificial intelligence...
Share on Facebook Share on LinkedIn Share on X

QNAP releases security patches for critical vulnerabilities in VioStor NVR systems.

QNAP Systems has released security updates to address several vulnerabilities in the QVR firmware of its VioStor Network Video Recorder (NVR) systems. On August 29, 2025, two serious security vulnerabilities...
Share on Facebook Share on LinkedIn Share on X

Computer engineer found dead on Microsoft campus in Mountain View

An Indian-born software engineer employed by Microsoft Corp. has been found dead on the company's campus in Mountain View, California. The 35-year-old, identified as Pratik Pandey and originally from Indore,...
Share on Facebook Share on LinkedIn Share on X

Living-off-the-Land 2.0: When Attackers Weaponize Security Tools

Sophos has warned of an increasingly sophisticated attacker practice: the use of legitimate cybersecurity tools as part of a Living-off-the-Land (LotL) tactic, in which an attack is carried out using...
Share on Facebook Share on LinkedIn Share on X

What a hacker attack! Ursula von der Leyen’s plane was the victim of an electronic warfare attack (EW)

A disturbing episode of electronic warfare (EW) directly involved the President of the European Commission, Ursula von der Leyen. On approach to Plovdiv Airport in Bulgaria, the jet carrying the...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sito
DIG AI: The Dark Web’s New AI Tool for Cybercrime
Redazione RHC - 21/12/2025

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…

Immagine del sito
Airbus Eyes Sovereign Cloud to Mitigate US Data Risks
Redazione RHC - 21/12/2025

In recent months, a question has been emerging with increasing insistence on European corporate boards: is the US cloud really safe for all companies? Especially for those operating in strategic sectors or with economic, industrial,…

Immagine del sito
North Korean Hackers Steal $2 Billion in Crypto, Targeting DeFi Sector
Redazione RHC - 21/12/2025

In 2025, North Korean hackers stole a record $2 billion in cryptocurrency , 51% more than the previous year. However, the number of attacks has decreased, while the damage has increased. According to Chainalysis, North…

Immagine del sito
Linux Kernel CVE-2025-68260 Vulnerability Fixed: Rust Code at Risk
Redazione RHC - 19/12/2025

The world of technology is a veritable battlefield, where coding geniuses challenge malicious attackers every day with exploits and security patches. That’s why the recent discovery of a vulnerability in the Linux kernel has caused…

Immagine del sito
HPE OneView Vulnerability CVE-2025-37164: Critical Security Update Required
Redazione RHC - 18/12/2025

Cybersecurity is a serious issue, especially when it comes to vulnerabilities that can compromise an entire system. Well, Hewlett Packard Enterprise (HPE) has just raised the alarm about a truly worrying security flaw in its…