Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Crowdstrike 320×100
970x20 Itcentric

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

KaruHunters Claims Cyber Attack on RIPE NCC

A post recently appeared on a popular underground forum that's attracting the attention of the cybersecurity community. A user with...
Redazione RHC - 4 October 2025

Microsoft IIS under attack from Chinese criminal hackers: How UAT-8099 exploits authoritative websites

A Chinese cybercriminal group known as UAT-8099 has been identified by Cisco Talos as responsible for a large-scale attack campaign....
Redazione RHC - 4 October 2025

Computer science is no longer a safe career! What’s changing for students and companies?

For decades, computer science was considered a stable career choice, brimming with opportunities. Today, however, students, universities, and businesses face...
Redazione RHC - 4 October 2025

China cracks down on fake news generated by artificial intelligence

The Cyberspace Administration of China has announced the launch of a two-month nationwide campaign, which began on July 24 ,...
Redazione RHC - 4 October 2025

China under surveillance: Users sanctioned for spreading fake news online

In recent months, Hainan public security authorities have launched investigations and imposed administrative sanctions against several internet users responsible for...
Redazione RHC - 3 October 2025

Asahi Group under hacker attack: beer supplies at risk

Last Monday, Asahi Group, Japan's largest beer, whisky, and soft drink maker, temporarily suspended its operations in Japan following a...
Redazione RHC - 3 October 2025

Critical vulnerability in Apache Tomcat must be patched, otherwise the server could go into DoS.

A critical security flaw has been discovered in Apache Tomcat's HTTP/2 implementation. This vulnerability allows attackers to conduct malicious denial-of-service (DoS) attacks on web servers. The vulnerability, tracked under CVE-2025-48989...
Share on Facebook Share on LinkedIn Share on X

After Darcula comes Magic Mouse: the new phishing nightmare steals 650,000 cards a month.

After the closure of the Darcula phishing platform and the Magic Cat software used by scammers, the Magic Mouse solution has gained popularity among criminals. According to Mnemonic specialists, Magic...
Share on Facebook Share on LinkedIn Share on X

Fortinet VPN Under Attack: New Wave of Brute-Force Attacks Detected by GrayNoise

GreyNoise detected two major waves of attacks on Fortinet devices in early August 2025. The first, a brute-force attack targeting Fortinet's SSL VPN on August 3, was followed by an...
Share on Facebook Share on LinkedIn Share on X

Whonix 17.4 is out! Only a 0day exploit can threaten your anonymity.

Version 17.4 of the Whonix distribution, designed to ensure greater anonymity online, has been released. The system is based on Debian GNU/Linux and transmits all traffic via Tor. The source...
Share on Facebook Share on LinkedIn Share on X

Backdoor in xz Utils: 35 Docker Hub images still infected

Analysts at Binarly have found at least 35 images on Docker Hub still infected with a backdoor that penetrated xz Utils last year. Researchers warned that this could potentially put...
Share on Facebook Share on LinkedIn Share on X

Huawei introduces algorithm that reduces dependence on foreign chips

Huawei has unveiled a new software tool that speeds up large AI models by distributing data more efficiently across different types of memory. This could help China reduce its dependence...
Share on Facebook Share on LinkedIn Share on X

Did you meet a girl online? Four Ghanaians might have hit on you.

The U.S. Department of Justice has indicted four Ghanaian nationals for their involvement in a massive international fraud ring that stole over $100 million through romance scams and attacks that...
Share on Facebook Share on LinkedIn Share on X

Microsoft Office: Three Critical Vulnerabilities: Update Now

Three serious vulnerabilities in Microsoft Office that could allow attackers to execute remote code on affected systems have been addressed by Microsoft with the release of crucial security updates. These...
Share on Facebook Share on LinkedIn Share on X

Self-programming AI: 2025 could mark a turning point for programmers

From learning machines to self-improving ones: the evolutionary leap that is rewriting the code of the future As you read this article, most likely, in a data center around the...
Share on Facebook Share on LinkedIn Share on X

The Sexualisation of AI: A Warning for Humanity

Is AI replacing intimacy? Artificial Intelligence is one of the most powerful technological shifts in human history. It can simulate thought, learn from data, and perform intellectual feats in seconds...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sito
Critical MongoDB Vulnerability Exposed: CVE-2025-14847
Redazione RHC - 23/12/2025

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…

Immagine del sito
RansomHouse Ransomware Upgraded: Enhanced Encryption Threat
Redazione RHC - 22/12/2025

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…

Immagine del sito
Cyber Attacks on the Rise: Wiper Malware and Data Destruction in 2025
Redazione RHC - 22/12/2025

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers use wipers, destructive tools that…

Immagine del sito
MS13-089 Ransomware: Double Extortion Without Encryption
Inva Malaj - 22/12/2025

MS13-089 opens a leak site on the dark web, exposes the first data and adopts a double extortion strategy without encryption. A brand built on an old Microsoft ID For years, “MS13-089” identified a 2013…

Immagine del sito
Microsoft Shifts Activation Process: What It Means for Air-Gapped Systems
Redazione RHC - 22/12/2025

In the past, many users and system administrators have relied on Microsoft’s telephone activation service to manage installations in specific contexts. During the Windows 8 era, MAK ( Multiple Activation Key) licenses were widely available.…