Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Red Hot Cyber Conference 2026: Sponsorships Open for the Fifth Edition in Rome
Di Redazione RHC - 04/09/2025

The Red Hot Cyber Conference has become a regular event for the Red Hot Cyber community and for anyone working in or interested in the world of digital technologies and cybersecurity. The fifth editio...

Hexstrike AI unleashes chaos! Zero-days exploited in record time
Di Redazione RHC - 04/09/2025

The release of Hexstrike-AI marks a turning point in the cybersecurity landscape. The framework, billed as a next-generation tool for red teams and researchers, is capable of orchestrating over 150 sp...

LockBit 5.0: Signs of a New and Possible “Rebirth”?
Di Pietro Melillo - 03/09/2025

LockBit represents one of the longest-running and most structured ransomware gangs of recent years, with a Ransomware-as-a-Service (RaaS) model that has profoundly impacted the criminal ecosystem. Fol...

The KING of DDoS! Cloudflare blocks a monstrous 11.5 terabit-per-second attack.
Di Redazione RHC - 03/09/2025

The record for the largest DDoS attack ever recorded in June 2025 has already been broken. Cloudflare said it recently blocked the largest DDoS attack in history, which peaked at 11.5 Tbps. “Cloudfl...

Palo Alto Networks Also Compromised via Salesforce and Drift
Di Antonio Piazzolla - 02/09/2025

In early September 2025, Palo Alto Networks confirmed it had been the victim of a data breach. The compromise did not affect its core products or services, but rather some internally used Salesforce i...

AI browser extensions? There’s too much uncertainty: the risk still lies in user awareness!

Anthropic has raised the alarm about a new threat related to "smart" browser extensions: Websites can infiltrate hidden commands that an AI agent will...
Redazione RHC - 29/08/2025 - 10:21

Little engineers for big robots! Is Italy also focusing on young people?

In Stavropol, Russian Federation, the race for the regional robotics championship for younger students has officially begun. Applications can be submi...
Redazione RHC - 29/08/2025 - 10:11

Phishing on Teams: at least the hacker responds faster than the real help desk!

In recent months, as previously reported on Red Hot Cyber, a new front has emerged in the corporate phishing landscape: Microsoft Teams attacks in whi...
Redazione RHC - 29/08/2025 - 09:02

It’s a global cyber shock! Beijing’s 007s are infiltrating and compromising the world’s Internet backbones.

The United States and several allied countries have issued a joint warning about a growing cyber offensive conducted by actors sponsored by the People...
Redazione RHC - 29/08/2025 - 08:42

Submarine cables are vulnerable! New strategies are needed.

Researchers from Reichman University (Israel) have detailed in an article in the journal Nature Electronics the growing risks and threats posed by nat...
Redazione RHC - 28/08/2025 - 20:54

Popular password managers, including LastPass, 1Password, and Bitwarden, are vulnerable to clickjacking.

A security expert has discovered that six of the most popular password managers, used by tens of millions of people, are vulnerable to clickjacking, a...
Redazione RHC - 28/08/2025 - 17:56
1 11 12 13 14 15 125

Shocking law in Russia: searching for prohibited content on the web becomes an administrative offense.

- September 1st, 2025

In Russia, a law amending fines from 3,000 to 5,000 rubles for deliberately searching for extremist material on the Internet, including using a VPN, came into force on September 1....

  

Managed SOC: A Strategic Choice for Corporate Cybersecurity

- September 1st, 2025

In recent years, companies have faced a radical shift in managing their cybersecurity. The growing complexity of digital infrastructures, the spread of remote working, the progressive adoption of the cloud,...

  

Tesla under fire! The hacker hired by the victims recovers data deleted in the fatal crash.

- August 31st, 2025

An independent hacker has uncovered hidden data related to a fatal accident involving a Tesla in Florida in 2019, reigniting the debate over the automaker's transparency and setting an unprecedented...

  

Fiber Computers Are Coming! E-textiles Are Coming, the Smart Fabric Revolution

- August 31st, 2025

Scientists have assembled the key elements of a computing system into a single, flexible, and even machine-washable thread. The idea is to weave many of these threads into fabric to...

  

Sign up for the newsletter