Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Redhotcyber Banner Sito 320x100px Uscita 101125
LECS 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Microsoft blocks access to cloud services for Israel’s Intelligence Unit 8200

The Israeli intelligence unit, the Israeli equivalent of the US National Security Agency (NSA), has been stripped of access to...
Redazione RHC - 28 September 2025

Hackers hit the United States: critical federal infrastructure compromised

Hackers have breached Cisco networking equipment belonging to several US government agencies , Bloomberg reports. The cyber threat, which occurred...
Redazione RHC - 28 September 2025

Shocking collapse: -71% of job offers for software engineers in three years

A new Google report highlights how artificial intelligence is now an integral part of the daily work of technology professionals....
Redazione RHC - 28 September 2025

Delivery of €13 million in submarine cables for the Shanhaiguan offshore project

At Haihui Port in Xiaoting, along the Yangtze River, a large red steel structure provided the backdrop for the delivery...
Redazione RHC - 28 September 2025

Microsoft gives in to EU pressure: Windows 10 will get free security updates.

Microsoft has agreed to address the demands of European human rights activists and extend Windows 10 support to users in...
Redazione RHC - 28 September 2025

New wave of malicious emails associated with the Hive0117 group

F6 has reported a new wave of malicious emails associated with the Hive0117 group. Hive0117 has been active since February...
Redazione RHC - 27 September 2025

Elk Cloner. The first computer virus in history.

In the late 1990s, when the Internet was still very young, it was common for tech-savvy kids to scare their friends by controlling (or, in Internet parlance, "trolling") their PCs...
Share on Facebook Share on LinkedIn Share on X

SoftBank launches 4G and 5G base stations on stratospheric airships

SoftBank has announced that trials of 4G and 5G base stations installed on airships will begin in Japan in 2026. The airships will lift the equipment to an altitude of...
Share on Facebook Share on LinkedIn Share on X

New GhostContainer backdoor discovered that threatens Asian companies’ Exchange instances

Kaspersky Lab specialists have discovered a new backdoor called GhostContainer, based on open-source tools. Researchers believe the appearance of this malware may be part of a sophisticated targeted campaign targeting...
Share on Facebook Share on LinkedIn Share on X

It costs 5 iPhones, jumps, throws punches, but still doesn’t wash dishes. R1, the Chinese robot that’s taking the internet by storm.

In the increasingly crowded landscape of humanoid robots, the new Unitree R1 has made headlines not only for its acrobatic capabilities, but above all for its unconventional price: around $5,900...
Share on Facebook Share on LinkedIn Share on X

Backdoor Alert! China Concerned About Possible Interference Through Nvidia Chips

The Cyberspace Administration of China (CAC) has expressed concern about the recent US proposal to integrate tracking and localization capabilities into advanced chips intended for export. This measure could jeopardize...
Share on Facebook Share on LinkedIn Share on X

Microsoft Edge launches Copilot mode, following Chrome’s lead.

After two years of small changes to the Edge browser's AI features, Microsoft recently added Copilot mode to the Edge browser, officially entering the AI browser market. Specifically, the AI...
Share on Facebook Share on LinkedIn Share on X

Vibe Coding Goes Wild. AI Generates Vulnerable Code, But No One Cares

Artificial intelligence is increasingly becoming a programmers' assistant, but a Veracode study has shown that convenience comes with a security risk. An analysis of 100 top language models (LLMs) revealed...
Share on Facebook Share on LinkedIn Share on X

ChatGPT chats shared on Google! Privacy threat or SEO opportunity?

Google has started indexing ChatGPT conversations that users share using the "Share" button. The issue first came to light thanks to a Fast Company investigation, which revealed—through the use of...
Share on Facebook Share on LinkedIn Share on X

Russia introduces fines for accessing extremist material via VPN

Russian President Vladimir Putin signed a law establishing administrative liability for VPN service owners and introducing fines for those who deliberately search for and gain access to extremist material. Last...
Share on Facebook Share on LinkedIn Share on X

Google Strengthens Security with Device Bound Session Credentials, Passkeys, and New Zero-Day Policies

Google is pushing the boundaries of security with a new initiative, makingDevice Bound Session Credentials (DBSC) a public beta feature that helps protect users from session cookie theft. Initially introduced...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sito
La Poste Hit by Pro-Russian DDoS Attack During Peak Holiday Season
Redazione RHC - 23/12/2025

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…

Immagine del sito
CVE-2025-47761: FortiClient VPN Zero-Day Exploit Lets Privilege Escalation
Manuel Roccon - 23/12/2025

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…

Immagine del sito
Critical MongoDB Vulnerability Exposed: CVE-2025-14847
Redazione RHC - 23/12/2025

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…

Immagine del sito
RansomHouse Ransomware Upgraded: Enhanced Encryption Threat
Redazione RHC - 22/12/2025

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…

Immagine del sito
Cyber Attacks on the Rise: Wiper Malware and Data Destruction in 2025
Redazione RHC - 22/12/2025

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers use wipers, destructive tools that…