Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Fortinet 320x100px
970x20 Itcentric

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Fake Microsoft Teams installer! One-time certificates and a backdoor in the download

In recent days, a malvertising campaign targeting business users trying to download Microsoft Teams has been discovered. At first glance,...
Antonio Piazzolla - 29 September 2025

The pregnancy robot is coming! Is it fake news or a harbinger of things to come?

Earlier this month, news emerged about Chinese company Kaiwa Technology , which had reportedly created a "pregnancy robot." The news...
Redazione RHC - 29 September 2025

NIST Towards Post-Quantum Cryptography

NIST , through its National Cybersecurity Center of Excellence (NCCoE) , has released the first draft of a new document...
Marcello Filacchioni - 29 September 2025

Critical flaws in Chinese robots. A zombie robot bonet can be remotely controlled.

On September 27, 2025, new concerns emerged about robots produced by China's Unitree Robotics , after serious vulnerabilities were reported...
Redazione RHC - 28 September 2025

Akira Ransomware: New Campaign Targets SonicWall Firewalls

Since late July 2025, a new wave of cyber attacks has been recorded targeting organizations equipped with SonicWall firewalls, with...
Redazione RHC - 28 September 2025

Fujitsu unveils Post-K: the ARM supercomputer that will be 100 times faster than “K”

After having signed the contract to build the Japanese supercomputer "K," one of the most powerful in the world, Fujitsu...
Redazione RHC - 28 September 2025

Cyborg Cockroaches: Singapore hosts the world’s first mass-produced cyborg cockroach.

Scientists from Nanyang Technological University, together with Japanese colleagues, have created the world's first robotic line for the mass production of cyborg cockroaches. This has made it possible to abandon...
Share on Facebook Share on LinkedIn Share on X

AI is hungry for energy! HyperGrid, the largest private nuclear complex, is underway.

Fermi America has signed a memorandum of understanding with Hyundai Engineering & Construction (Hyundai E&C) to design and build the nuclear portion of a large-scale private energy infrastructure project aimed...
Share on Facebook Share on LinkedIn Share on X

“Vibe Coding” for Malware! A Malicious AI-Created Package Appears on NPM

Researchers have identified a new threat in the npm ecosystem: a malicious AI-generated package called @kodane/patch-manager, designed to steal cryptocurrency. Presented as a library for "advanced license control and registry...
Share on Facebook Share on LinkedIn Share on X

What are Rootkits? Discovering one of the most insidious threats

Rootkits are one of the most insidious and complex cyber threats in the digital security landscape. The term "rootkit" comes from the combination of two words: "root," which in Unix...
Share on Facebook Share on LinkedIn Share on X

Industroyer: The Malware That Shut Down Kiev and Threatens Global Power Grids

The Industroyer malware, also known as Crashoverride, was a framework developed by Russian hackers, deployed in 2016 against Ukraine's power grid. The attack left Kiev without power for an hour....
Share on Facebook Share on LinkedIn Share on X

Stuxnet: The Malware That Introduced Cyberwarfare to the World

Stuxnet is widely recognized as the malware par excellence, the one that introduced cyber warfare to the world, where pages and pages have been written and will continue to be...
Share on Facebook Share on LinkedIn Share on X

WannaCry: The Ransomware That Changed the World of Cybersecurity

May 12, 2017, was a special day. For many, it will mean nothing, but others will remember it well, because it was a hectic and eventful day as the world...
Share on Facebook Share on LinkedIn Share on X

What is spyware: how it works and how it affects. The complete guide.

Spyware is malware (malicious programs) designed to infiltrate users' computer systems to monitor their activities and collect personal information. These programs can be installed on devices without the user's consent...
Share on Facebook Share on LinkedIn Share on X

Discovering Wipers: The Silent Threat That Ruthlessly Destroys Data

Wider malware (in Italian "eliminator" or "deleter") is a type of malicious software designed to destroy or "erase" data and files on the computer systems it infects. Unlike other types...
Share on Facebook Share on LinkedIn Share on X

What are Remote Access Trojans (RATs): The menacing shadow behind spam emails

Remote Access Trojans (RATs), or Remote Access Trojans, are a category of malware. They are designed to allow attackers to remotely control an infected device. This malware is particularly dangerous...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sito
La Poste Hit by Pro-Russian DDoS Attack During Peak Holiday Season
Redazione RHC - 23/12/2025

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…

Immagine del sito
CVE-2025-47761: FortiClient VPN Zero-Day Exploit Lets Privilege Escalation
Manuel Roccon - 23/12/2025

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…

Immagine del sito
Critical MongoDB Vulnerability Exposed: CVE-2025-14847
Redazione RHC - 23/12/2025

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…

Immagine del sito
RansomHouse Ransomware Upgraded: Enhanced Encryption Threat
Redazione RHC - 22/12/2025

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…

Immagine del sito
Cyber Attacks on the Rise: Wiper Malware and Data Destruction in 2025
Redazione RHC - 22/12/2025

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers use wipers, destructive tools that…