Welcome to Red Hot Cyber | Cybersecurity News
Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
UtiliaCS 320x100
Fortinet 970x120px

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

WhatsApp Web in the crosshairs! How the worm that distributes the banking Trojan works

Sophos analysts have discovered a complex malware operation by security experts that uses the popular messaging service WhatsApp to spread...
Redazione RHC - 14 October 2025

Goodbye Microsoft Word. China chooses WPS Office for official documents

China continues to pursue technological independence, and this time the signal has come not from microchip manufacturers, but from government...
Redazione RHC - 14 October 2025

RMPocalypse: A critical bug in AMD SEV-SNP threatens cloud security.

A critical vulnerability has been identified in the AMD SEV-SNP hardware security architecture, impacting major cloud providers (AWS, Microsoft Azure,...
Redazione RHC - 13 October 2025

Poisoned AI! 250 Malicious Documents Are Enough to Compromise an LLM

Researchers at Anthropic, in collaboration with the UK government's AI Safety Institute, the Alan Turing Institute, and other academic institutions,...
Redazione RHC - 13 October 2025

Spyware yes, spyware no: it’s just a prospect! NSO Group is now under US control.

Israeli company NSO Group, developer of the infamous Pegasus spyware , recently came under the control of American investors. A...
Redazione RHC - 13 October 2025

Electricians and plumbers: They are the real winners of the AI boom

Jensen Huang, CEO of NVIDIA, has openly stated that the real winners in the AI boom, at least in the...
Sandro Sana - 13 October 2025

BruteForceAI: When AI Learns to Hack Logins Better Than a Human Hacker

BruteForceAI is a new penetration testing framework that combines artificial intelligence and automation to take brute-force to the next level. Developed by Mor David, the tool uses large language models...
Share on Facebook Share on LinkedIn Share on X

Critical Linux Vulnerability: CVSS 8.5 Vulnerability Discovered in UDisks Daemon

A critical security flaw in the Linux UDisks daemon was recently discovered, allowing potential unprivileged attackers to access files belonging to highly privileged users. The vulnerability, classified as CVE-2025-8067, was...
Share on Facebook Share on LinkedIn Share on X

Transparency and Resilience: NIST Publishes Meta-Framework to Change Supply Chain Management

The National Institute of Standards and Technology (NIST), through its National Cybersecurity Center of Excellence (NCCoE), has introduced a decentralized data approach to help manufacturers and critical infrastructure sectors protect...
Share on Facebook Share on LinkedIn Share on X

LilyGO T-Embed CC1101 and Bruce Firmware, the community makes studying Rolling Code possible

Research into radio frequency security never stops. In recent years, we've seen the emergence of increasingly accessible tools that have brought the world of RF hacking beyond academic laboratories. One...
Share on Facebook Share on LinkedIn Share on X

New AI-powered stethoscope now delivers cardiac diagnoses in 15 seconds

British doctors have tested an advanced stethoscope equipped with artificial intelligence capable of detecting three serious heart conditions in just 15 seconds. Practical results of the study showed that the...
Share on Facebook Share on LinkedIn Share on X

WhatsApp wins $167 million lawsuit against NSO and its Pegasus spyware

A major legal breakthrough is upon us. A US court has ordered NSO Group, a notorious spyware maker, to pay $167 million to WhatsApp. This ruling stems from a 2019...
Share on Facebook Share on LinkedIn Share on X

IBM and AMD Create New Architectures Between Quantum Computing and High-Performance Computing (HPC)

IBM and AMD will develop new computing architectures at the intersection of quantum and classical approaches, writes the AMD press office. Executives from IBM and AMD announced a partnership in...
Share on Facebook Share on LinkedIn Share on X

DarkMirror H1 2025 Released: Dark Lab’s Ransomware Threat Report

Ransomware continues to represent one of the most pervasive and damaging threats in the global cybersecurity landscape. In the regular "DarkMirror" report produced by Red Hot Cyber's DarkLab intelligence laboratory,...
Share on Facebook Share on LinkedIn Share on X

Shocking law in Russia: searching for prohibited content on the web becomes an administrative offense.

In Russia, a law amending fines from 3,000 to 5,000 rubles for deliberately searching for extremist material on the Internet, including using a VPN, came into force on September 1....
Share on Facebook Share on LinkedIn Share on X

Managed SOC: A Strategic Choice for Corporate Cybersecurity

In recent years, companies have faced a radical shift in managing their cybersecurity. The growing complexity of digital infrastructures, the spread of remote working, the progressive adoption of the cloud,...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sito
DIG AI: The Dark Web’s New AI Tool for Cybercrime
Redazione RHC - 21/12/2025

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…

Immagine del sito
Airbus Eyes Sovereign Cloud to Mitigate US Data Risks
Redazione RHC - 21/12/2025

In recent months, a question has been emerging with increasing insistence on European corporate boards: is the US cloud really safe for all companies? Especially for those operating in strategic sectors or with economic, industrial,…

Immagine del sito
North Korean Hackers Steal $2 Billion in Crypto, Targeting DeFi Sector
Redazione RHC - 21/12/2025

In 2025, North Korean hackers stole a record $2 billion in cryptocurrency , 51% more than the previous year. However, the number of attacks has decreased, while the damage has increased. According to Chainalysis, North…

Immagine del sito
Linux Kernel CVE-2025-68260 Vulnerability Fixed: Rust Code at Risk
Redazione RHC - 19/12/2025

The world of technology is a veritable battlefield, where coding geniuses challenge malicious attackers every day with exploits and security patches. That’s why the recent discovery of a vulnerability in the Linux kernel has caused…

Immagine del sito
HPE OneView Vulnerability CVE-2025-37164: Critical Security Update Required
Redazione RHC - 18/12/2025

Cybersecurity is a serious issue, especially when it comes to vulnerabilities that can compromise an entire system. Well, Hewlett Packard Enterprise (HPE) has just raised the alarm about a truly worrying security flaw in its…