Welcome to Red Hot Cyber | Cybersecurity News
Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320x100 Itcentric
LECS 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Hacker culture pioneer Peter Samson plays “Boards of Canada” on PDP-1

In a world where music has long since migrated to streaming and digital platforms, one enthusiast decided to go back...
Redazione RHC - 12 October 2025

Crimson Collective claims alleged Nintendo hack: bluff or real breach?

This time, hackers are targeting Nintendo , the historic Japanese video game company that has been tooth and nail for...
Luca Galuppi - 12 October 2025

Critical vulnerabilities in Microsoft Defender for Endpoint: security risks

Security flaws have been discovered in network communication between Microsoft Defender for Endpoint (DFE) cloud services , allowing attackers, following...
Redazione RHC - 12 October 2025

Between AI and fear, Skynet teaches: “We’ll build bunkers before launching AGI.”

The quote, “We’ll definitely build a bunker before we launch AGI,” that inspired the article, was attributed to a Silicon...
Redazione RHC - 12 October 2025

GitHub is migrating to Azure! And goodbye to new development for a year.

When Microsoft acquired GitHub in 2018, the company tried to stay away. The platform developed relatively independently until things began...
Redazione RHC - 12 October 2025

China dominates industrial robotics: 2 million machines in factories

China is consolidating its position as a global manufacturing powerhouse thanks to an unprecedented pace of production and installation of...
Redazione RHC - 12 October 2025

Let the hunt begin! Hackers exploit Citrix flaw to infiltrate global systems

A critical zero-day flaw, classified as CVE-2025-6543, has been discovered in Citrix NetScaler systems. This vulnerability has been actively exploited by malicious hackers since May 2025, several months before a...
Share on Facebook Share on LinkedIn Share on X

The Pentagon launches an audit of Microsoft. It investigates Chinese engineers and alleged backdoors.

The Pentagon has sent a "letter of concern" to Microsoft documenting a "breach of trust" regarding the company's use of Chinese engineers to maintain sensitive government computer systems, Defense Secretary...
Share on Facebook Share on LinkedIn Share on X

Amazon Stops APT29: Sophisticated Russian Watering Hole Campaign Foiled

A complex watering hole campaign, orchestrated by the notorious hacker group APT29, linked to Russian foreign intelligence services, was neutralized by Amazon's cybersecurity team. This latest campaign marks a significant...
Share on Facebook Share on LinkedIn Share on X

The best defense is a good offense! Google is ready to launch cyber attacks against criminal hackers.

Google is poised to adopt a more proactive stance to protect itself and potentially other U.S. organizations from cyberattacks, with the company suggesting it may assume the role of attacker...
Share on Facebook Share on LinkedIn Share on X

A zero-click exploit for WhatsApp allowed remote surveillance. Meta warns victims.

A security flaw in WhatsApp's messaging apps for Apple iOS and macOS has been patched, the company reported, after likely being widely exploited alongside a recently discovered Apple vulnerability in...
Share on Facebook Share on LinkedIn Share on X

Google warns 2.5 billion Gmail users: account security at risk. Reset your password!

A far-reaching security advisory has been issued by Google to the 2.5 billion users of its Gmail service, aiming to strengthen the protection of their accounts following a data breach...
Share on Facebook Share on LinkedIn Share on X

Moscow hires hackers who attacked the Electronic School in 2022 to improve it

Participants in the cyberattack on the Moscow Electronic School were offered towork to improve cybersecurity and other digital services of the capital's administration. This all comes after September 17, 2022,...
Share on Facebook Share on LinkedIn Share on X

Want a free PDF editor? You downloaded malware included in the premium package.

A complex malware campaign has been discovered, targeting users searching for free PDF editing software. A malicious application, disguised as a legitimate "AppSuite PDF Editor", is being spread by cybercriminals....
Share on Facebook Share on LinkedIn Share on X

Critical vulnerabilities are on the rise! Awareness, Patching, and Audits are key.

According to a Kaspersky Lab report, the use of vulnerabilities increased significantly in the second quarter of 2025: almost every subsystem of modern computers was attacked, from UEFI to browser...
Share on Facebook Share on LinkedIn Share on X

Iran Cyber Army: Spear-phishing attacks against governments around the world (including Italy!)

A recent Cyber Threat Intelligence (CTI) analysis conducted by DREAM has revealed details of a complex spear-phishing campaign that occurred in August 2025. The attack, attributed to an Iran-aligned group...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sito
DIG AI: The Dark Web’s New AI Tool for Cybercrime
Redazione RHC - 21/12/2025

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…

Immagine del sito
Airbus Eyes Sovereign Cloud to Mitigate US Data Risks
Redazione RHC - 21/12/2025

In recent months, a question has been emerging with increasing insistence on European corporate boards: is the US cloud really safe for all companies? Especially for those operating in strategic sectors or with economic, industrial,…

Immagine del sito
North Korean Hackers Steal $2 Billion in Crypto, Targeting DeFi Sector
Redazione RHC - 21/12/2025

In 2025, North Korean hackers stole a record $2 billion in cryptocurrency , 51% more than the previous year. However, the number of attacks has decreased, while the damage has increased. According to Chainalysis, North…

Immagine del sito
Linux Kernel CVE-2025-68260 Vulnerability Fixed: Rust Code at Risk
Redazione RHC - 19/12/2025

The world of technology is a veritable battlefield, where coding geniuses challenge malicious attackers every day with exploits and security patches. That’s why the recent discovery of a vulnerability in the Linux kernel has caused…

Immagine del sito
HPE OneView Vulnerability CVE-2025-37164: Critical Security Update Required
Redazione RHC - 18/12/2025

Cybersecurity is a serious issue, especially when it comes to vulnerabilities that can compromise an entire system. Well, Hewlett Packard Enterprise (HPE) has just raised the alarm about a truly worrying security flaw in its…