Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Mobile
970x20 Itcentric

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

CrowdStrike: Cybersecurity Enters the Age of AI Agents Cybercrime

CrowdStrike: Cybersecurity Enters the Age of AI Agents

At Fal.Con 2025, the annual conference that brings together thousands of cybersecurity experts from around the world, CrowdStrike made one...
Marcello Filacchioni - 24 September 2025
Critical bug in Salesforce CLI: Arbitrary code execution and SYSTEM access Cybercrime

Critical bug in Salesforce CLI: Arbitrary code execution and SYSTEM access

A critical vulnerability in the Salesforce CLI installer (sf-x64.exe) allows attackers to gain arbitrary code execution, privilege escalation, and SYSTEM-level...
Redazione RHC - 24 September 2025
Google Chrome Zero-Day Vulnerability: CISA Warns and Files Bug on KEV Cybercrime

Google Chrome Zero-Day Vulnerability: CISA Warns and Files Bug on KEV

The United States has received an alert from the Cybersecurity and Infrastructure Security Agency (CISA) regarding a highly critical zero-day...
Redazione RHC - 24 September 2025
Violent social media and video games: the new ticking time bomb for teens. Cybercrime

Violent social media and video games: the new ticking time bomb for teens.

The uncontrolled use of social media and violent video games poses a growing threat to adolescents at a crucial stage...
Redazione RHC - 24 September 2025
WhatsApp introduces in-app message translation Cybercrime

WhatsApp introduces in-app message translation

WhatsApp has announced a new feature that allows for in-app message translation . The company emphasizes that language barriers often...
Redazione RHC - 24 September 2025
TikTok, the app setting the US ablaze: billion-dollar deal for total control Cybercrime

TikTok, the app setting the US ablaze: billion-dollar deal for total control

TikTok's fate in the United States is now inextricably linked to political negotiations. The White House has announced that the...
Redazione RHC - 24 September 2025

Microsoft Betrayed from Within? Chinese Hackers Exploited SharePoint Bugs Before Patches

Microsoft has launched an internal investigation to determine whether a leak of confidential information from the Microsoft Active Protections Program (MAPP) allowed state-sponsored Chinese hackers to exploit serious SharePoint vulnerabilities...
Share on Facebook Share on LinkedIn Share on X

Vibecoding to create ransomware: FunkSec cybergang uses AI for cyberattacks

Kaspersky Lab specialists studied the activity of the FunkSec group, which emerged in late 2024. The group's main characteristics were: the use of AI-based tools (including in the development of...
Share on Facebook Share on LinkedIn Share on X

Germany invests in cyborg insects and AI robots for military and civilian use.

The events of recent years are rapidly changing the world, forcing us to rethink many aspects of economics and production, as well as seek new tools to solve current problems....
Share on Facebook Share on LinkedIn Share on X

What is Ethical Hacking: An Introduction to the Fascinating World of Ethical Hacking

Ethical Hacking is a fascinating yet enigmatic discipline. It's a field where ethics and technology merge to defend the digital world. If you're already intrigued by this mysterious world, or...
Share on Facebook Share on LinkedIn Share on X

The Key to Software Security: CVSS 4.0 and Vulnerability Management

How are software security vulnerabilities assessed? Is it possible to determine their severity? How can we determine the order in which to update code in the event of multiple vulnerabilities?...
Share on Facebook Share on LinkedIn Share on X

What is Red Team? A journey into the world of offensive security experts.

The evolution of cyber threats is a constant in today's world. Malicious individuals, often driven by financial, ideological, or other motivations, seek new ways to overcome organizations' digital and physical...
Share on Facebook Share on LinkedIn Share on X

Why responsible vulnerability disclosure is important.

We often talk about responsible vulnerability disclosure, but as we've already seen, very often this doesn't happen with a well-regulated approach, although there are several international ideas and best practices,...
Share on Facebook Share on LinkedIn Share on X

OpenAI’s experimental model wins gold medal at the Mathematical Olympiad.

OpenAI has reached a new milestone in the development of artificial intelligence: its experimental model achieved "gold medal" results at the International Mathematical Olympiad, according to Alexander Wei, an OpenAI...
Share on Facebook Share on LinkedIn Share on X

Microsoft reduces AI’s environmental impact with human and agricultural waste.

Microsoft has decided to reduce the environmental impact of its artificial intelligence by turning to a seemingly unlikely resource: human and agricultural waste. The company has signed a contract with...
Share on Facebook Share on LinkedIn Share on X

Discovering the Cyber Kill Chain. Defend your network and learn how to attack and defend yourself.

In the digital age, cybersecurity has become a priority for businesses and individuals. Among the most fearsome threats are cyberattacks, targeted intrusions that can cause significant damage, both financially and...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Webrat Malware Targets Security Researchers with GitHub Exploit Traps
Redazione RHC - 24/12/2025

There’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…

Immagine del sitoCybercrime
A backdoor in NVIDIA code. Three 9.8 bugs plague AI and robotics development systems
Redazione RHC - 24/12/2025

When it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…

Immagine del sitoCybercrime
La Poste Hit by Pro-Russian DDoS Attack During Peak Holiday Season
Redazione RHC - 23/12/2025

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…

Immagine del sitoVulnerability
CVE-2025-47761: FortiClient VPN Zero-Day Exploit Lets Privilege Escalation
Manuel Roccon - 23/12/2025

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…

Immagine del sitoCybercrime
Critical MongoDB Vulnerability Exposed: CVE-2025-14847
Redazione RHC - 23/12/2025

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…