Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
TM RedHotCyber 320x100 042514
970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

As Windows 10 retires, Windows 7 installs double in two months

Windows 7 was one of Microsoft's best operating systems, and many still praise its stability today . But Microsoft discontinued...
Redazione RHC - 29 September 2025

Bill Gates: Programmers are not at risk! AI is a tool, not a competitor.

Artificial intelligence is rapidly changing traditional professions. Just yesterday, we reported that the demand for software engineers has dropped 71%...
Redazione RHC - 29 September 2025

Global attacks on Cisco devices: Cyber agencies warn of ongoing crisis

Major agencies around the world have raised the alarm about a critical threat to network infrastructure: vulnerabilities in Cisco Adaptive...
Redazione RHC - 29 September 2025

A DLL hijacking bug targets Notepad++. Risk of arbitrary code execution.

A critical DLL hijacking vulnerability has been identified in Notepad++ version 8.8.3 by security researchers, with the flaw assigned CVE-2025-56383....
Redazione RHC - 29 September 2025

Google Project Zero Researcher Reveals How to Bypass ASLR on macOS and iOS

A researcher on Google's Project Zero team has revealed a new method for remotely exfiltrating memory addresses on Apple's macOS...
Redazione RHC - 29 September 2025

Make training an adventure! Choose Betti RHC for your cybersecurity awareness.

Are you tired of boring e-learning training courses? Do you really want to educate your company's employees about bad and...
Redazione RHC - 29 September 2025

Apple Develops Its Own Artificial Intelligence Engine to Power Siri

Apple is developing its own AI engine for answering questions, similar to ChatGPT, according to Bloomberg. The project is managed by a new internal team called Answers, Knowledge and Information...
Share on Facebook Share on LinkedIn Share on X

Proxy Trickster: The Amateur Hackers Group That Wants to Own Servers Worldwide

Specialists at Solar 4RAYS of Solar Group have discovered a new hacker group, Proxy Trickster, dedicated to cryptocurrency mining and proxyjacking (interception of server control for conversion and sale). Over...
Share on Facebook Share on LinkedIn Share on X

Malware disguises itself as an innocent photo on Dropbox. APT37’s steganographic strategy

Specialists at the Genians Security Center have discovered an improved version of the RoKRAT malware, associated with the North Korean APT37 group. The new version is distinguished by an unusual...
Share on Facebook Share on LinkedIn Share on X

BitLocker Under Attack! A New Technique Enables Lateral Movement While Eluding Security Controls

Through BitLocker's Component Object Model (COM) feature, attackers can deploy an innovative pivoting technique to execute malicious code on targeted systems. This approach, demonstrated via a test tool called BitLockMove,...
Share on Facebook Share on LinkedIn Share on X

Mozilla warns Firefox extension developers of active phishing campaign

Mozilla has warned Firefox extension developers of a new phishing campaign aimed at compromising their accounts on the official AMO platform (addons.mozilla.org). This ecosystem includes over 60,000 add-ons and more...
Share on Facebook Share on LinkedIn Share on X

Is Open Source Going Away? KubeSphere Discontinues Distribution, Ensuing Storm

Unfortunately, times are changing: what was once a temple of collaboration and cooperation is gradually transforming into an ecosystem increasingly oriented towards monetization. Another project, specifically KubeSphere, has suddenly stopped...
Share on Facebook Share on LinkedIn Share on X

$14.5 billion stolen from LuBian! It’s the largest cryptocurrency theft in history.

In December 2020, the Chinese mining pool LuBian, which at the time occupied nearly 6% of the total Bitcoin network capacity, was the victim of an attack whose full extent...
Share on Facebook Share on LinkedIn Share on X

Companies Go Bankrupt Due to Ransomware! Einhaus Group Shuts Down, Serving as a Warning to Everyone

We discussed this in an article on the topic some time ago written by Massimiliano Brolli. Today, cybersecurity is no longer an option or an ancillary value: it is a...
Share on Facebook Share on LinkedIn Share on X

The Ransomware Nightmare Gets Worse: “We Know Where Your Kids Live.” The New Frontier of Cybercrime

A ransomware expert has revealed that criminal hackers are increasingly threatening physical violence against targeted company employees and their families, to force victim organizations to pay ransoms. According to a...
Share on Facebook Share on LinkedIn Share on X

Chinese-Made Digital Espionage: APT41 Uses SharePoint to Infiltrate African Governments

The Chinese-linked cyber group APT41 has launched a new espionage operation targeting government IT services in Africa, an unexpected turn of events for a region previously considered an unlikely target....
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sito
La Poste Hit by Pro-Russian DDoS Attack During Peak Holiday Season
Redazione RHC - 23/12/2025

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…

Immagine del sito
CVE-2025-47761: FortiClient VPN Zero-Day Exploit Lets Privilege Escalation
Manuel Roccon - 23/12/2025

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…

Immagine del sito
Critical MongoDB Vulnerability Exposed: CVE-2025-14847
Redazione RHC - 23/12/2025

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…

Immagine del sito
RansomHouse Ransomware Upgraded: Enhanced Encryption Threat
Redazione RHC - 22/12/2025

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…

Immagine del sito
Cyber Attacks on the Rise: Wiper Malware and Data Destruction in 2025
Redazione RHC - 22/12/2025

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers use wipers, destructive tools that…