Welcome to Red Hot Cyber | Cybersecurity News
Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
LECS 320x100 1
LECS 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

RDP Services Exposed in the Crosshairs! A Botnet of 100,000 IPs Scans the Network

In the United States, a large-scale, coordinated botnet campaign is targeting Remote Desktop Protocol (RDP)-based services. The scale and organizational...
Redazione RHC - 11 October 2025

Everyone’s Hacking iPhones! Apple Increases iOS Reward to $5 Million

Apple has significantly expanded its bounty program for security vulnerabilities in the iOS ecosystem. At the Hexacon offensive security conference...
Redazione RHC - 11 October 2025

Artificial intelligence = Alcohol for teens! It damages social and cognitive skills

Today's students are increasingly turning to artificial intelligence, not only for study aids, but also for social interaction and emotional...
Redazione RHC - 11 October 2025

Velociraptor used in active attacks to distribute LockBit and Babuk ransomware

Hackers have begun using Velociraptor , the digital forensics and incident response (DFIR) tool, to launch LockBit and Babuk ransomware...
Redazione RHC - 11 October 2025

SonicWall confirms data breach. Cloud backup service customers at risk.

SonicWall confirmed that a data breach last month affected all customers using the company's cloud backup service. As a result,...
Redazione RHC - 11 October 2025

RondoDox Botnet Discovered: Thousands of Devices at Risk

A large botnet called RondoDox has been discovered exploiting 56 vulnerabilities in more than 30 different devices, including bugs first...
Redazione RHC - 11 October 2025

China unveils KylinOS11 with AI integration: the national operating system that will replace Windows

China has unveiled KylinOS11, the largest update to its national operating system, which the government called a major step forward in creating an independent technology ecosystem. The new version runs...
Share on Facebook Share on LinkedIn Share on X

The Dawn supercomputer takes the fight against cancer: a new era of research with AI

The project "A basic model for cancer vaccine design" has been shortlisted for an award from the UK government's prestigious AI Research Resource (AIRR) initiative, led by the Department for...
Share on Facebook Share on LinkedIn Share on X

China launches compact space debris removal system

Chinese scientists have unveiled a compact space launcher, initially designed to remove dangerous space debris, but which could potentially be used as a weapon. The project was conceived by engineers...
Share on Facebook Share on LinkedIn Share on X

What is Wetware: The Future of Brain Enhancement Through Hardware and Software

By definition, wetware refers to technology that combines hardware and software to enhance biological life forms. Steve M. Potter, an associate professor at the Neuroengineering Laboratory at the University of...
Share on Facebook Share on LinkedIn Share on X

AI browser extensions? There’s too much uncertainty: the risk still lies in user awareness!

Anthropic has raised the alarm about a new threat related to "smart" browser extensions: Websites can infiltrate hidden commands that an AI agent will execute without thinking. Anthropic has released...
Share on Facebook Share on LinkedIn Share on X

Little engineers for big robots! Is Italy also focusing on young people?

In Stavropol, Russian Federation, the race for the regional robotics championship for younger students has officially begun. Applications can be submitted starting August 25th, with a window that will remain...
Share on Facebook Share on LinkedIn Share on X

Phishing on Teams: at least the hacker responds faster than the real help desk!

In recent months, as previously reported on Red Hot Cyber, a new front has emerged in the corporate phishing landscape: Microsoft Teams attacks in which attackers impersonate IT or help...
Share on Facebook Share on LinkedIn Share on X

It’s a global cyber shock! Beijing’s 007s are infiltrating and compromising the world’s Internet backbones.

The United States and several allied countries have issued a joint warning about a growing cyber offensive conducted by actors sponsored by the People's Republic of China. According to a...
Share on Facebook Share on LinkedIn Share on X

Submarine cables are vulnerable! New strategies are needed.

Researchers from Reichman University (Israel) have detailed in an article in the journal Nature Electronics the growing risks and threats posed by natural and man-made factors to undersea communications cables,...
Share on Facebook Share on LinkedIn Share on X

Popular password managers, including LastPass, 1Password, and Bitwarden, are vulnerable to clickjacking.

A security expert has discovered that six of the most popular password managers, used by tens of millions of people, are vulnerable to clickjacking, a phenomenon that allows attackers to...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sito
DIG AI: The Dark Web’s New AI Tool for Cybercrime
Redazione RHC - 21/12/2025

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…

Immagine del sito
Airbus Eyes Sovereign Cloud to Mitigate US Data Risks
Redazione RHC - 21/12/2025

In recent months, a question has been emerging with increasing insistence on European corporate boards: is the US cloud really safe for all companies? Especially for those operating in strategic sectors or with economic, industrial,…

Immagine del sito
North Korean Hackers Steal $2 Billion in Crypto, Targeting DeFi Sector
Redazione RHC - 21/12/2025

In 2025, North Korean hackers stole a record $2 billion in cryptocurrency , 51% more than the previous year. However, the number of attacks has decreased, while the damage has increased. According to Chainalysis, North…

Immagine del sito
Linux Kernel CVE-2025-68260 Vulnerability Fixed: Rust Code at Risk
Redazione RHC - 19/12/2025

The world of technology is a veritable battlefield, where coding geniuses challenge malicious attackers every day with exploits and security patches. That’s why the recent discovery of a vulnerability in the Linux kernel has caused…

Immagine del sito
HPE OneView Vulnerability CVE-2025-37164: Critical Security Update Required
Redazione RHC - 18/12/2025

Cybersecurity is a serious issue, especially when it comes to vulnerabilities that can compromise an entire system. Well, Hewlett Packard Enterprise (HPE) has just raised the alarm about a truly worrying security flaw in its…