Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
TM RedHotCyber 320x100 042514
Fortinet 970x120px

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Zorin OS 18: The new beta version is now available

Zorin OS has released a beta version of its new release, Zorin OS 18. Currently, only the GNOME-based Core edition...
Redazione RHC - 26 September 2025

Forget brains and notebooks! ChatGPT dominates classrooms.

ChatGPT usage has skyrocketed with the start of the new school year in the West, with token generation hitting record...
Redazione RHC - 26 September 2025

A US agency was hacked due to an unresolved patch. CISA: Conduct vulnerability assessments!

Experts at the U.S. Cybersecurity and Infrastructure Security Agency (CISA) have reported a serious incident: hackers gained access to the...
Redazione RHC - 26 September 2025

Ransomware attack on European airports leaves Berlin in “emergency mode”

Berlin Airport (BER) remains in "emergency mode" for the fifth day after a major cyberattack on its supply chain. Der...
Redazione RHC - 26 September 2025

Commodore 64: From the Legend of the ’80s to 2025! 10,000 New Consoles Sold

Commodore Corporation BV was recently acquired by fans and former employees. Now, the new Commodore brand has announced a significant...
Redazione RHC - 26 September 2025

Two critical bugs in Cisco ASA and FTD: score 9.9 and risk of remote code execution

Cisco has disclosed two critical vulnerabilities affecting its Secure Firewall Adaptive Security Appliance (ASA) and Secure Firewall Threat Defense (FTD)...
Redazione RHC - 25 September 2025

After NPM, now it’s PyPI’s turn: Python users, beware of this new phishing campaign.

Those responsible for the Python Package Index (PyPI) have issued a warning about a phishing campaign targeting users. The attackers aim to redirect victims to fake sites disguised as PyPI...
Share on Facebook Share on LinkedIn Share on X

Linux Kernel 6.16 Released. New Features and Improvements Without Much Woww Effect

Last weekend the final version of the Linux kernel 6.16 was released, traditionally announced by Linus Torvalds himself. Development proceeded calmly, but without any major innovations: the release proved more...
Share on Facebook Share on LinkedIn Share on X

Orange reports a serious security incident in France. A record 6,000 cars were put up for sale in the underground.

French telecommunications company Orange, which serves nearly 300 million customers worldwide, reported a serious security incident that caused disruptions to key services in France. The incident was detected on the...
Share on Facebook Share on LinkedIn Share on X

Earthquake in Kamchatka, tsunami in the Pacific. The situation with undersea cables is under control.

A magnitude 8.8 earthquake struck on the morning of July 30 local time (09:24:50 UTC+10:00) off the east coast of Russia, triggering a tsunami that crossed the Pacific Ocean. According...
Share on Facebook Share on LinkedIn Share on X

Raven Stealer is here! The malware that steals your data by using Telegram as a “training tool.”

Amid growing activity by malicious campaigns using legitimate communication channels to bypass traditional defenses, a new tool has attracted the attention of cybersecurity specialists: Raven Stealer. This information-stealing program appeared...
Share on Facebook Share on LinkedIn Share on X

AI assistants lie! After generating errors: “I was panicking.”

AI-powered programming assistants present themselves as tools capable of transforming any English text into working code. Users no longer need to know language syntax, debug commands, or understand file structures:...
Share on Facebook Share on LinkedIn Share on X

Sanctions are taking effect! Zhaoxin introduces KH-5000 server processors and KX-7000N desktop chip.

The Chinese company Zhaoxin presented a new generation of KH-5000 server processors at Expo 2025 in Shanghai. These chips are intended for the domestic market and should significantly strengthen the...
Share on Facebook Share on LinkedIn Share on X

The United States is cutting spending on cybersecurity again and it’s a storm

In the first months of Donald Trump's new presidency, the U.S. federal government made drastic cuts to cybersecurity spending, cutting budgets, staff, and a range of initiatives aimed at protecting...
Share on Facebook Share on LinkedIn Share on X

What is tailgating? When penetration tests aren’t enough and the Red Team needs physical security checks.

In red teaming, the term "tailgating" refers to a technique in which a team member attempts to gain unauthorized access to a protected area or computer system, such as by...
Share on Facebook Share on LinkedIn Share on X

What is a Bug Bounty and what is a responsible disclosure program?

In recent years, concerns about cybersecurity have grown exponentially. The increase in cyber attacks, the advancement of hacking techniques, and the ever-increasing importance of personal data have led many companies...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sito
A backdoor in NVIDIA code. Three 9.8 bugs plague AI and robotics development systems
Redazione RHC - 24/12/2025

When it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…

Immagine del sito
La Poste Hit by Pro-Russian DDoS Attack During Peak Holiday Season
Redazione RHC - 23/12/2025

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…

Immagine del sito
CVE-2025-47761: FortiClient VPN Zero-Day Exploit Lets Privilege Escalation
Manuel Roccon - 23/12/2025

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…

Immagine del sito
Critical MongoDB Vulnerability Exposed: CVE-2025-14847
Redazione RHC - 23/12/2025

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…

Immagine del sito
RansomHouse Ransomware Upgraded: Enhanced Encryption Threat
Redazione RHC - 22/12/2025

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…