Welcome to Red Hot Cyber | Cybersecurity News
Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
UtiliaCS 320x100
Enterprise BusinessLog 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Spyware yes, spyware no: it’s just a prospect! NSO Group is now under US control.

Israeli company NSO Group, developer of the infamous Pegasus spyware , recently came under the control of American investors. A...
Redazione RHC - 13 October 2025

Electricians and plumbers: They are the real winners of the AI boom

Jensen Huang, CEO of NVIDIA, has openly stated that the real winners in the AI boom, at least in the...
Sandro Sana - 13 October 2025

Towards “legal technology”: legal education in the digital age must be technological.

As a criminal lawyer and professor of Criminal Computer Law, a student of the late Vittorio Frosini, a pioneer of...
Paolo Galdieri - 13 October 2025

ProxyCommand: The Little String That Opens a Port for Exploits

Yesterday, a vulnerability in OpenSSH, CVE-2025-61984, was published that potentially allows command execution on the client when ProxyCommand is used...
Antonio Piazzolla - 13 October 2025

The AI bubble: fears of a new technological meltdown grow

At DevDay, OpenAI's annual conference this week, CEO Sam Altman took questions from reporters, an increasingly rare occurrence among tech...
Redazione RHC - 13 October 2025

DAS: The world’s ear hidden in submarine cables

Over 1.2 million kilometers of fiber optic cables lie on the ocean floor, long considered solely part of a global...
Redazione RHC - 13 October 2025

Shocking law in Russia: searching for prohibited content on the web becomes an administrative offense.

In Russia, a law amending fines from 3,000 to 5,000 rubles for deliberately searching for extremist material on the Internet, including using a VPN, came into force on September 1....
Share on Facebook Share on LinkedIn Share on X

Managed SOC: A Strategic Choice for Corporate Cybersecurity

In recent years, companies have faced a radical shift in managing their cybersecurity. The growing complexity of digital infrastructures, the spread of remote working, the progressive adoption of the cloud,...
Share on Facebook Share on LinkedIn Share on X

Tesla under fire! The hacker hired by the victims recovers data deleted in the fatal crash.

An independent hacker has uncovered hidden data related to a fatal accident involving a Tesla in Florida in 2019, reigniting the debate over the automaker's transparency and setting an unprecedented...
Share on Facebook Share on LinkedIn Share on X

Fiber Computers Are Coming! E-textiles Are Coming, the Smart Fabric Revolution

Scientists have assembled the key elements of a computing system into a single, flexible, and even machine-washable thread. The idea is to weave many of these threads into fabric to...
Share on Facebook Share on LinkedIn Share on X

Navy and Marine Corps test hydrogen balloon and drone surveillance system

At Outlying Landing Field Seagle in California, the U.S. Navy and Marine Corps tested a new system that allows ships to "see beyond the horizon." From May 19 to 21,...
Share on Facebook Share on LinkedIn Share on X

Microsoft denies that the August update damaged SSDs: Users say otherwise.

Microsoft has denied that the August Windows 11 security update is linked to mass complaints of storage device failures. The investigation was launched following reports from users who, after installing...
Share on Facebook Share on LinkedIn Share on X

GitHub and GitLab are increasingly under fire! Targeted attacks targeting developers via fake repositories

By hosting fake projects on popular development platforms (GitHub and GitLab), attackers trick users into running malicious payloads that pull add-ons from a hacker-controlled repository. As a result, remote access...
Share on Facebook Share on LinkedIn Share on X

Meta’s AI bots use avatars of minors and celebrities: a storm erupts.

Meta found itself at the center of a scandal after a Reuters investigation revealed that AI-powered chatbots that mimicked celebrities were being distributed on the company's platforms. These virtual characters,...
Share on Facebook Share on LinkedIn Share on X

Sindoor Dropper: The Malware Using the India-Pakistan Clash to Infect Linux

An insidious malware attack known as "Sindoor Dropper" targets Linux operating systems, leveraging sophisticated spear-phishing methods and a complex, multi-stage infection process. The insidious operation targets users with lures related...
Share on Facebook Share on LinkedIn Share on X

Iranian cyber attacks disrupt Gaza ceasefire negotiations

Mediation efforts led by Arab nations to secure the release of Israelis held by Hamas and a ceasefire in Gaza have been interrupted by cyber attacks from Iran, a cybersecurity...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sito
DIG AI: The Dark Web’s New AI Tool for Cybercrime
Redazione RHC - 21/12/2025

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…

Immagine del sito
Airbus Eyes Sovereign Cloud to Mitigate US Data Risks
Redazione RHC - 21/12/2025

In recent months, a question has been emerging with increasing insistence on European corporate boards: is the US cloud really safe for all companies? Especially for those operating in strategic sectors or with economic, industrial,…

Immagine del sito
North Korean Hackers Steal $2 Billion in Crypto, Targeting DeFi Sector
Redazione RHC - 21/12/2025

In 2025, North Korean hackers stole a record $2 billion in cryptocurrency , 51% more than the previous year. However, the number of attacks has decreased, while the damage has increased. According to Chainalysis, North…

Immagine del sito
Linux Kernel CVE-2025-68260 Vulnerability Fixed: Rust Code at Risk
Redazione RHC - 19/12/2025

The world of technology is a veritable battlefield, where coding geniuses challenge malicious attackers every day with exploits and security patches. That’s why the recent discovery of a vulnerability in the Linux kernel has caused…

Immagine del sito
HPE OneView Vulnerability CVE-2025-37164: Critical Security Update Required
Redazione RHC - 18/12/2025

Cybersecurity is a serious issue, especially when it comes to vulnerabilities that can compromise an entire system. Well, Hewlett Packard Enterprise (HPE) has just raised the alarm about a truly worrying security flaw in its…