Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320×100
Fortinet 970x120px

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

The “non-sensitive data” trap: the costly mistake for companies

A wonderfully widespread argument among those who work with personal data is that of underestimating the risks or refusing to...
Stefano Gazzella - 1 October 2025

With 50 dollars and physical access to the server, the Cloud goes to hell

A team of researchers has developed a simple hardware tool that challenges the fundamental principles of trusted computing in modern...
Redazione RHC - 1 October 2025

Discovering the Emotional Firewall! The Vulnerability No One Is Patching

There is one critical issue in the cyber arena that we have not yet patched: our emotional firewall . This...
Daniela Farina - 1 October 2025

Not the children! 8,000 personal data of children from a nursery school are at risk of being published.

A criminal hacker group calling itself Radiant has claimed responsibility for stealing the personal data of over 8,000 children enrolled...
Redazione RHC - 1 October 2025

Programming in crisis: Junior job openings plummet as AI transforms the workplace.

Artificial intelligence is no longer a futuristic concept from science fiction films . It is already part of our daily...
Redazione RHC - 1 October 2025

Work, Artificial Intelligence, and Marketing: What Skills Will We Need in 2025?

In recent years, the marketing industry has undergone a radical transformation : today, one in two positions requires artificial intelligence...
Redazione RHC - 30 September 2025

HTTP/1.1 Must Die! Critical vulnerabilities put millions of websites at risk.

A critical security flaw in HTTP/1.1 has been disclosed by security experts, highlighting a threat that has continued to impact web infrastructure for more than six years, potentially impacting millions...
Share on Facebook Share on LinkedIn Share on X

A new Privilege Escalation (PE) technique allows UAC bypass on Windows

A recent discovery has uncovered a sophisticated technique that bypasses Windows User Account Control (UAC), allowing privilege escalation without user intervention through the use of the private font editor, raising...
Share on Facebook Share on LinkedIn Share on X

The new Flipper Zero firmware made in DarkWeb becomes the key to every car

A new custom firmware for the Flipper Zero multi-purpose device is capable of bypassing many of the rolling code security systems implemented in the majority of modern vehicles, potentially exposing...
Share on Facebook Share on LinkedIn Share on X

AI Panic: We’re Entering the Most Dangerous Phase of the Digital Revolution

In recent months, the debate over artificial intelligence has taken on increasingly extreme tones. On the one hand, large companies developing and selling AI solutions are pushing apocalyptic narratives, warning...
Share on Facebook Share on LinkedIn Share on X

Windows is losing ground. Linux is growing on corporate desktops, citing increased security.

Linux usage on corporate desktops and laptops continues to grow. An analysis of nearly 18.5 million devices found that Linux's share of enterprise devices increased from 1.6% in January to...
Share on Facebook Share on LinkedIn Share on X

No Spyware for Every Crime! Germany Says No to Sentences Under Three Years

Germany's Supreme Court rules that police can only use spyware to investigate serious crimes.It ruled that law enforcement cannot use spyware to monitor personal devices in cases carrying a maximum...
Share on Facebook Share on LinkedIn Share on X

Critical vulnerability in Google’s Gemini CLI allows malicious commands to be executed.

A serious vulnerability has been discovered in Google's recently released Gemini CLI tool, which allows attackers to silently execute malicious commands and leak data from developers' computers if certain commands...
Share on Facebook Share on LinkedIn Share on X

Fortinet Discovers a New Obfuscated Web Shell. Analysis of UpdateChecker.aspx

The FortiGuard Labs team has published a detailed analysis of a heavily obfuscated web shell used to attack critical infrastructure in the Middle East. The research focuses on the UpdateChecker.aspx...
Share on Facebook Share on LinkedIn Share on X

You’ve been paying for months for a VPN that has done nothing but spy on you

The complex infrastructure of the fraudulent ad network VexTrio Viper has returned to the spotlight after researchers at Infoblox revealed details of a massive fake mobile app scheme. Under the...
Share on Facebook Share on LinkedIn Share on X

Discovering Access Brokers. What are Initial Access Brokers (IaBs) and what do they sell in the underground market?

We've often talked about how ransomware attacks work and how the ransomware as a service (RaaS) pyramid works, which assigns a role to each team of criminal hackers, as seen...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sito
La Poste Hit by Pro-Russian DDoS Attack During Peak Holiday Season
Redazione RHC - 23/12/2025

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…

Immagine del sito
CVE-2025-47761: FortiClient VPN Zero-Day Exploit Lets Privilege Escalation
Manuel Roccon - 23/12/2025

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…

Immagine del sito
Critical MongoDB Vulnerability Exposed: CVE-2025-14847
Redazione RHC - 23/12/2025

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…

Immagine del sito
RansomHouse Ransomware Upgraded: Enhanced Encryption Threat
Redazione RHC - 22/12/2025

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…

Immagine del sito
Cyber Attacks on the Rise: Wiper Malware and Data Destruction in 2025
Redazione RHC - 22/12/2025

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers use wipers, destructive tools that…