Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320x100 Itcentric
Banner Ancharia Desktop 1 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Asahi Group under hacker attack: beer supplies at risk

Last Monday, Asahi Group, Japan's largest beer, whisky, and soft drink maker, temporarily suspended its operations in Japan following a...
Redazione RHC - 3 October 2025

Criminal Hackers Target Seniors! Datzbro Arrives: Facebook and Smartphones Targeted

A new malicious campaign is using Facebook as a vehicle to spread Datzbro , an Android malware that combines the...
Redazione RHC - 3 October 2025

100 bug researchers, $32 million! HackerOne: AI bugs are on the rise!

Vulnerability bounty platform HackerOne reported that white hat hackers worldwide received $81 million in compensation over the past 12 months....
Redazione RHC - 3 October 2025

Beyond the Screen: The Postal Police Event for a Healthy Life Beyond Social Media

The Red Hot Cyber Community had the opportunity to participate in "Beyond the Screen," the Postal Police's important initiative for...
Marcello Filacchioni - 3 October 2025

They’re offering you €55,000 for access to your office account. What should you do?

BBC journalist Joe Tidy found himself in a situation usually hidden in the shadows of cybercrime. In July, he received...
Redazione RHC - 3 October 2025

Telegram opens an artificial intelligence lab in Kazakhstan

Telegram founder Pavel Durov announced the opening of a new artificial intelligence lab in Kazakhstan . The announcement was made...
Redazione RHC - 3 October 2025

The Sexualisation of AI: A Warning for Humanity

Is AI replacing intimacy? Artificial Intelligence is one of the most powerful technological shifts in human history. It can simulate thought, learn from data, and perform intellectual feats in seconds...
Share on Facebook Share on LinkedIn Share on X

Elon Musk sues Apple for App Store manipulation

Elon Musk has announced that his company xAI is preparing to sue Apple. The reason is manipulation of App Store rankings, which, he claims, puts OpenAI's ChatGPT in a more...
Share on Facebook Share on LinkedIn Share on X

Artificial intelligence is pushing companies to return to in-person interviews

The job search process has been profoundly altered by artificial intelligence, prompting many companies to revive a more traditional approach: face-to-face interviews, as the WSJ points out. Virtual interviews have...
Share on Facebook Share on LinkedIn Share on X

Battle for the Brain! OpenAI and Sam Altman launch Merge Labs, a rival to Neuralink.

OpenAI and its co-founder Sam Altman are preparing to back a company that will rival Elon Musk's Neuralink by developing technology to connect the human brain to a computer. The...
Share on Facebook Share on LinkedIn Share on X

Charon Ransomware Arrives. It Surpasses EDR, Is Stealth, and Gives a Nod to Top APTs

Trend Micro has detected a targeted attack on the government and aviation sectors in the Middle East using a new ransomware called Charon. The attackers employed a complex infection chain...
Share on Facebook Share on LinkedIn Share on X

Critical Vulnerability in Fortinet: Update FortiOS, FortiProxy, and FortiPAM Now

Several Fortinet security products, including FortiOS, FortiProxy, and FortiPAM, are affected by a high-severity authentication evasion vulnerability. The flaw, tracked as CVE-2024-26009, has a CVSS score of 7.9 and allows...
Share on Facebook Share on LinkedIn Share on X

Critical Update for Google Chrome: Patches for Various Vulnerabilities

A critical security update has been released for Google Chrome, which addresses six security vulnerabilities that could be exploited to execute arbitrary code on affected systems. An emergency security update...
Share on Facebook Share on LinkedIn Share on X

Heading for a bang for August! 36 RCEs for Microsoft Patch Tuesday August

August Patch Tuesday: Microsoft releases security updates that fix 107 vulnerabilities across its ecosystem products. The update includes fixes for 90 vulnerabilities, classified as follows: 13 are critical, 76 are...
Share on Facebook Share on LinkedIn Share on X

Critical RCE vulnerability in Microsoft Teams: Urgent update needed

As part of the August 2025 Patch Tuesday security updates, a critical Remote Code Execution (RCE) vulnerability in Microsoft's Teams collaboration software has been patched. The critical flaw, tracked as...
Share on Facebook Share on LinkedIn Share on X

29,000 Exchange servers at risk. The exploit for CVE-2025-53786 is under exploitation.

29,000 Exchange servers are vulnerable to CVE-2025-53786, which allows attackers to move within Microsoft cloud environments, potentially leading to complete domain compromise. CVE-2025-53786 allows attackers who have already gained administrative...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sito
CVE-2025-47761: FortiClient VPN Zero-Day Exploit Lets Privilege Escalation
Manuel Roccon - 23/12/2025

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…

Immagine del sito
Critical MongoDB Vulnerability Exposed: CVE-2025-14847
Redazione RHC - 23/12/2025

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…

Immagine del sito
RansomHouse Ransomware Upgraded: Enhanced Encryption Threat
Redazione RHC - 22/12/2025

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…

Immagine del sito
Cyber Attacks on the Rise: Wiper Malware and Data Destruction in 2025
Redazione RHC - 22/12/2025

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers use wipers, destructive tools that…

Immagine del sito
MS13-089 Ransomware: Double Extortion Without Encryption
Inva Malaj - 22/12/2025

MS13-089 opens a leak site on the dark web, exposes the first data and adopts a double extortion strategy without encryption. A brand built on an old Microsoft ID For years, “MS13-089” identified a 2013…