Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
LECS 320x100 1
Redhotcyber Banner Sito 970x120px Uscita 101125

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Discovering Prompt Injection: When AI Gets Fooled by Words

Generative Artificial Intelligence (GenAI) systems are revolutionizing the way we interact with technology, offering extraordinary capabilities in the creation of...
Manuel Roccon - 2 October 2025

Can a camera read your mind? The answer comes from Portugal.

A study conducted at the Champalimode Foundation in Portugal has shown that a simple video recording is enough to "peek"...
Redazione RHC - 2 October 2025

Microsoft challenges Nvidia and AMD with its proprietary chips for artificial intelligence.

Microsoft is accelerating the in-house production of semiconductors for its data centers, aiming to reduce its dependence on external suppliers...
Redazione RHC - 2 October 2025

China mandates AI content labels. Let’s see what’s happening.

Starting September 1, 2025, all artificial intelligence (AI)-generated content in China must be marked with an "electronic watermark," according to...
Redazione RHC - 2 October 2025

MatrixPDF arrives: just a few clicks and phishing is served!

A new phishing toolkit, MatrixPDF , has been discovered that allows attackers to transform ordinary PDF files into interactive decoys...
Redazione RHC - 1 October 2025

A critical bug in VMware Aria Operations and VMware Tools has been exploited by Chinese hackers for months.

Broadcom has fixed a severe privilege escalation vulnerability in VMware Aria Operations and VMware Tools that was exploited in attacks...
Redazione RHC - 1 October 2025

Drones under fire! A NATO country orders a 100 kW laser for air defense.

Australian company Electro Optic Systems Holdings Limited (EOS)has signed the world's first export contract for a 100-kilowatt laser air defense system capable of destroying swarms of drones. The deal is...
Share on Facebook Share on LinkedIn Share on X

James Cameron: AI can cause devastation like Skynet and Terminator

"The Skynet military defense system will go live on August 4, 1997. It will begin to self-educate, learning at an exponential rate, and will become self-aware at 2:14 a.m. on...
Share on Facebook Share on LinkedIn Share on X

150 Malicious Firefox Extensions Stole $1 Million in Cryptocurrency

Koi Security analysts have discovered the GreedyBear malware campaign active in the Mozilla add-on store. 150 malicious Firefox extensions stole over $1 million worth of cryptocurrency from users. The fraudulent...
Share on Facebook Share on LinkedIn Share on X

Over 60s, Under Fire! Hackers Stole $700 Million from Seniors

Americans over 60 lost a staggering $700 million to online fraud in 2024, the highest figure ever recorded by the Federal Trade Commission (FTC). The new Consumer Protection Data Spotlight...
Share on Facebook Share on LinkedIn Share on X

EDRs are still going offline! Threats are growing with EDRKillShifter’s offspring.

A new tool for disabling EDR systems has emerged in the cybercriminal community, which Sophos experts believe to be an extension of the EDRKillShifter utility. Its use has already been...
Share on Facebook Share on LinkedIn Share on X

GPT-5 Hacked in 24 Hours. Experts Find Surprising Weaknesses

After Grok-4 was cracked in two days, GPT-5 was defeated in just 24 hours by the same researchers. Almost simultaneously, the SPLX (formerly SplxAI) testing team declared: "GPT-5 is crude...
Share on Facebook Share on LinkedIn Share on X

Did you double-click WinRAR? Congratulations! You’ve been compromised

A recently closed WinRAR vulnerability tracked under CVE-2025-8088 was exploited in targeted phishing attacks before the patch was released. The issue involved directory traversal and was only fixed in WinRAR...
Share on Facebook Share on LinkedIn Share on X

Satellites Under Hackers’ Control: “It’s Easier to Hack Them Than to Use Satellite Weapons”

At the Black Hat conference in Las Vegas, VisionSpace Technologies demonstrated that it is much easier and cheaper to disable a satellite or alter its trajectory than to use anti-satellite...
Share on Facebook Share on LinkedIn Share on X

A step toward autonomous warfare. A drone can autonomously program its “brain system.”

For the first time, it has been demonstrated that a robot can not only execute commands, but also program its own "brain system" from start to finish. This breakthrough was...
Share on Facebook Share on LinkedIn Share on X

GPT-5 is here! The billion-dollar AI that devours GPUs and makes GPT-4 look like a toy.

OpenAI has launched its new flagship model, and the message is clear: reliability, power, and a radical change in the way we interact with artificial intelligence. After years of viewing...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sito
La Poste Hit by Pro-Russian DDoS Attack During Peak Holiday Season
Redazione RHC - 23/12/2025

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…

Immagine del sito
CVE-2025-47761: FortiClient VPN Zero-Day Exploit Lets Privilege Escalation
Manuel Roccon - 23/12/2025

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…

Immagine del sito
Critical MongoDB Vulnerability Exposed: CVE-2025-14847
Redazione RHC - 23/12/2025

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…

Immagine del sito
RansomHouse Ransomware Upgraded: Enhanced Encryption Threat
Redazione RHC - 22/12/2025

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…

Immagine del sito
Cyber Attacks on the Rise: Wiper Malware and Data Destruction in 2025
Redazione RHC - 22/12/2025

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers use wipers, destructive tools that…