Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Crowdstrike 320×100
Enterprise BusinessLog 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

11 death sentences for online fraud. China deals a severe blow to cybercrime

Amid China's long battle against cross-border fraud, authorities have issued a verdict in one of the most high-profile cases in...
Redazione RHC - 6 October 2025

Is it possible to heat a house with Raspberry Pi? In the UK, the answer is yes.

In the UK, they've started testing an unusual way to heat homes: using mini data centers powered by Raspberry Pis....
Redazione RHC - 6 October 2025

Scattered LAPSUS$ Hunters Group Returns and Threatens to Release Salesforce Data

A group calling itself Scattered LAPSUS$ Hunters has resurfaced after months of silence and the arrest of its members. On...
Redazione RHC - 6 October 2025

Securing WebSocket Connections: Risk, Analysis, and Practical Measures

WebSockets offer persistent two-way communication between client and server, essential for real-time applications like chat, gaming, dashboards, and notifications. However,...
Diego Bentivoglio - 6 October 2025

Italy is a part of the Zero Day world! The first Italian CNAs are Leonardo and Almaviva!

Very little has been said about this event, which I personally consider strategically important and a sign of a major...
Massimiliano Brolli - 6 October 2025

WhatsApp Alert: New Malware Spreads Like a Virus Among Contacts

Trend Micro researchers have detected a large-scale malware campaign targeting users in Brazil. It is distributed via the desktop version...
Redazione RHC - 6 October 2025

Roblox under fire in Louisiana: A haven for sexual predators

Louisiana Attorney General Liz Murrill has filed a lawsuit against Roblox, accusing the company of allowing its platform to become a haven for sexual predators and distributors of child-themed content....
Share on Facebook Share on LinkedIn Share on X

Do you click on text message links? Here are 4.2 million reasons not to.

Proofpoint has released the second volume of its annual study "Human Factor 2025", focusing on phishing and URL-based attacks. Analysis of data from May 2024 to May 2025 shows that...
Share on Facebook Share on LinkedIn Share on X

Criminal Hackers Exploit Cisco Safe Links for Phishing Attacks

A complex attack operation was recently discovered, in which cyber attackers used Cisco's security infrastructure to perform online deception maneuvers. Attackers are targeting Cisco Safe Links technology, designed to protect...
Share on Facebook Share on LinkedIn Share on X

Ghost-tapping: How Asian scammers launder money with stolen credit cards

Scammers in Southeast Asia have found a new way to launder money using stolen credit cards. Researchers have reported a system they call "ghost-tapping," in which stolen card data is...
Share on Facebook Share on LinkedIn Share on X

Electronic Warfare. China develops a lamp that blocks enemy radar for miles.

Chinese engineers have announced the development of a miniature traveling-wave tube (TWT) that could revolutionize the capabilities of modern electronic warfare systems and radar. This special type of vacuum tube...
Share on Facebook Share on LinkedIn Share on X

Critical Score 10 Vulnerability in Erlang/Open Telecom Platform: Active Exploits on the Rise

Researchers recorded that a critical flaw in the Erlang/Open Telecom Platform SSH stack implementation began being actively exploited as early as early May 2025; approximately 70% of detections occurred on...
Share on Facebook Share on LinkedIn Share on X

Can’t find your Tesla? No problem: there’s Free TeslaMate.

A cybersecurity researcher has discovered that hundreds of TeslaMate servers around the world are openly transmitting Tesla vehicle data without any protection. This means that car telemetry—from precise coordinates and...
Share on Facebook Share on LinkedIn Share on X

Proton leaves Switzerland for Europe! €100 million for Lumo artificial intelligence

Technology company Proton, which already has 100 million users worldwide, found itself at the center of two major news stories. First, the launch of its generative artificial intelligence, Lumo, which...
Share on Facebook Share on LinkedIn Share on X

After XSS’s shutdown, Rehubcom arrives. The Dark Web continues.

A former moderator of the XSS dark web forum, known as Rehub, has launched his own platform called Rehubcom. The move coincides with the arrest of XSS's administrator in Kiev...
Share on Facebook Share on LinkedIn Share on X

Tesla’s Dojo project is dead. A technological gamble ended in resounding failure.

On July 23, 2025, Tesla held its second-quarter earnings conference call. Elon Musk, as usual, conveyed his infectious optimism to Wall Street. Speaking about Dojo, the company's carefully constructed artificial...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sito
RansomHouse Ransomware Upgraded: Enhanced Encryption Threat
Redazione RHC - 22/12/2025

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…

Immagine del sito
Cyber Attacks on the Rise: Wiper Malware and Data Destruction in 2025
Redazione RHC - 22/12/2025

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers use wipers, destructive tools that…

Immagine del sito
MS13-089 Ransomware: Double Extortion Without Encryption
Inva Malaj - 22/12/2025

MS13-089 opens a leak site on the dark web, exposes the first data and adopts a double extortion strategy without encryption. A brand built on an old Microsoft ID For years, “MS13-089” identified a 2013…

Immagine del sito
Microsoft Shifts Activation Process: What It Means for Air-Gapped Systems
Redazione RHC - 22/12/2025

In the past, many users and system administrators have relied on Microsoft’s telephone activation service to manage installations in specific contexts. During the Windows 8 era, MAK ( Multiple Activation Key) licenses were widely available.…

Immagine del sito
DIG AI: The Dark Web’s New AI Tool for Cybercrime
Redazione RHC - 21/12/2025

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…