Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Ancharia Mobile 1
Crowdstriker 970×120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Balancing speed and security! This is the real challenge of Vibe Coding.

The cybersecurity industry is undergoing a transformation: artificial intelligence is becoming not just a tool for developers, but also a...
Redazione RHC - 30 September 2025

TOR Anonymizer v3.0: Advanced Digital Privacy Protection

In a digital landscape increasingly characterized by mass surveillance and indiscriminate data collection, the pursuit of online anonymity has become...
Andrea Mongelli - 30 September 2025

Three serious vulnerabilities discovered in VMware vCenter and NSX: apply patches immediately.

On September 29, 2025, Broadcom released security advisory VMSA-2025-0016 , addressing three vulnerabilities identified in VMware vCenter and VMware NSX...
Redazione RHC - 29 September 2025

0-day 0-click WhatsApp! All it takes is one image to take control of your iPhone.

Some spyware producer is probably doing gymnastics... tearing their hair out. But it's the usual charade: someone finds, someone cashes...
Redazione RHC - 29 September 2025

Computer science graduates with no future! Thousands of resumes ignored, and goodbye to six-figure salaries.

Alarming trends are emerging in the IT job market. More and more computer science graduates are unable to find work,...
Redazione RHC - 29 September 2025

The US wants to hack Telegram! The case sparks debate over privacy and jurisdiction.

The U.S. Department of Justice has received court authorization to conduct a remote inspection of Telegram's servers as part of...
Redazione RHC - 29 September 2025

ShadowSyndicate: The MaaS Infrastructure Behind Major Ransomware Attacks

The ShadowSyndicate infrastructure, also known as Infra Storm, has come under the spotlight of security researchers after they identified significant overlap with some of the largest ransomware programs. Active since...
Share on Facebook Share on LinkedIn Share on X

With ToolShell, you can access the Internet information Services (IIS) Machine keys.

In an article published on August 5, 2025, on the ISC SANS blog by Bojan Zdrnja, it is possible to steal "machine keys" from IIS servers. The author explores the...
Share on Facebook Share on LinkedIn Share on X

Would you like to have a robot that does the laundry? Figure’s robot does it.

As for the mundane tasks humanoid robots could soon perform for us, the possibilities are vast. Doing laundry is probably at the top of many people's wish list. Figure 02...
Share on Facebook Share on LinkedIn Share on X

SonicWall in the crosshairs: possible 0-day vulnerability, users at risk

Last Sunday, Red Hot Cyber published an in-depth analysis of the increased malicious activity of the AKIRA ransomware, which appears to exploit an undocumented 0-day vulnerability in SonicWall devices with...
Share on Facebook Share on LinkedIn Share on X

Cisco Hit by a Vishing Attack! Registered Users’ Profile Data Exfiltrated

Cisco, a leading global network infrastructure and cybersecurity company, recently announced the impact of a security incident. Founded in 1984 and headquartered in San Jose, California, Cisco is known for...
Share on Facebook Share on LinkedIn Share on X

The Monte Carlo Casino is on D4rk4rmy’s website! The ransomware group claims responsibility for the cyber attack.

The criminal organization known as D4rk4rmy has claimed responsibility for the cyber attack against the Monte-Carlo Société des Bains de Mer (SBM) on its Data Leak Site (DLS). The site...
Share on Facebook Share on LinkedIn Share on X

Ransomware Exploits SharePoint! 4L4MD4R Discovered, the Hybrid Attack That’s Even Scare Governments

A massive campaign to exploit a series of vulnerabilities in Microsoft SharePoint continues to gather pace, now involving ransomware groups. While analyzing the series of attacks, Palo Alto Networks (Unit...
Share on Facebook Share on LinkedIn Share on X

Critical Bugs on NVIDIA Triton Allow Attackers to Compromise and Steal AI Model

Critical vulnerabilities have been discovered in NVIDIA's Triton Inference Server, threatening the security of AI infrastructure on Windows and Linux. The open-source solution is designed for large-scale deployment and maintenance...
Share on Facebook Share on LinkedIn Share on X

Everyone’s talking about GPT-5. No one’s seen it. But the memes are already everywhere.

GPT-5 hasn't even appeared yet, and internet users have started creating all kinds of memes to complain. Indeed, the rumors about GPT-5 haven't stopped in recent days. First, some internet...
Share on Facebook Share on LinkedIn Share on X

PoisonSeed: How Phishing Attacks Bypass FIDO with WebAuthn

The authors of the PoisonSeedphishing campaign have found a way to bypass FIDO (in this case, FIDO2 with WebAuthn) using the cross-device authentication mechanism implemented in WebAuthn. The attackers convince...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sito
La Poste Hit by Pro-Russian DDoS Attack During Peak Holiday Season
Redazione RHC - 23/12/2025

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…

Immagine del sito
CVE-2025-47761: FortiClient VPN Zero-Day Exploit Lets Privilege Escalation
Manuel Roccon - 23/12/2025

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…

Immagine del sito
Critical MongoDB Vulnerability Exposed: CVE-2025-14847
Redazione RHC - 23/12/2025

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…

Immagine del sito
RansomHouse Ransomware Upgraded: Enhanced Encryption Threat
Redazione RHC - 22/12/2025

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…

Immagine del sito
Cyber Attacks on the Rise: Wiper Malware and Data Destruction in 2025
Redazione RHC - 22/12/2025

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers use wipers, destructive tools that…