Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Enterprise BusinessLog 320x200 1
970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Supply Chain: The blockade of European airports raises concerns about an increasingly critical issue. Cybercrime

Supply Chain: The blockade of European airports raises concerns about an increasingly critical issue.

On September 20, 2025, a cyberattack hit three of Europe's major airports: London Heathrow, Brussels, and Berlin. The digital systems...
Paolo Galdieri - 24 September 2025
Dedigitalization: Japanese city of Toyoda restricts smartphone use Cybercrime

Dedigitalization: Japanese city of Toyoda restricts smartphone use

In the Japanese city of Toyoda (Aichi Prefecture), city council members approved a draft ordinance limiting smartphone use during leisure...
Redazione RHC - 24 September 2025
ShadowV2: New MaaS botnet for DDoS attacks uses containers Cybercrime

ShadowV2: New MaaS botnet for DDoS attacks uses containers

Amid growing criminal activity, Darktrace has uncovered a new campaign using the ShadowV2 botnet. Researchers detected malicious activity on June...
Redazione RHC - 24 September 2025
GitHub strengthens npm security against supply chain attacks. Cybercrime

GitHub strengthens npm security against supply chain attacks.

GitHub has announced major changes to its npm authentication and publishing system, aimed at strengthening protection against supply chain attacks....
Redazione RHC - 24 September 2025
Towards AGI: Google DeepMind warns, AI could ignore humans Cybercrime

Towards AGI: Google DeepMind warns, AI could ignore humans

Google DeepMind researchers have released an updated version of their AI risk assessment framework, Frontier Safety Framework 3.0 . This...
Redazione RHC - 24 September 2025
From Debugging to Breaking: Turning Crash Dumps into EDR Kill Switches Cybercrime

From Debugging to Breaking: Turning Crash Dumps into EDR Kill Switches

I have been working for several years as a System Engineer, and one of the tasks I handled was managing...
Alex Necula - 24 September 2025

What is Cyber Threat Intelligence? Let’s explore a fundamental discipline in cybersecurity.

Cyber Threat Intelligence (CTI) is the practice of collecting, analyzing, and using cyber threat information to protect organizations from malicious activity. CTI has become a key element of cybersecurity, helping...
Share on Facebook Share on LinkedIn Share on X

What is Open Source Intelligence (OSINT). Its importance and necessity in today’s world.

The web contains a sea of information. Between social networks, newspapers, specialized magazines, images, radio, and television... we use and produce a sea of public domain data, from which we...
Share on Facebook Share on LinkedIn Share on X

What are Vulnerability Assessments? A Journey into Automated Software Vulnerability Scanning

A vulnerability assessment is a process of evaluating computer systems, networks, and applications to identify vulnerabilities that could be exploited by attackers to compromise the system's security. The primary goal...
Share on Facebook Share on LinkedIn Share on X

Is the Linux kernel moving toward “vibe coding”? Rules for using AI assistants are coming soon.

Sasha Levin, a longtime Linux kernel developer at NVIDIA and previously at Google and Microsoft, has proposed adding formal rules for using AI assistants in development to the kernel documentation....
Share on Facebook Share on LinkedIn Share on X

Google is turning the web into a showcase for AI! A near-term disaster for the digital economy.

Google is turning its search engine into a showcase for artificial intelligence, and that could spell disaster for the entire digital economy. According to a new study from the Pew...
Share on Facebook Share on LinkedIn Share on X

Koske: Linux Malware Developed with Artificial Intelligence

AquaSec analysts have discovered a new Linux malware. The malware is called Koske and is believed to have been developed using artificial intelligence. It uses panda JPEG images to inject...
Share on Facebook Share on LinkedIn Share on X

Beyond the Code: When AI Reminds Us Who We Are

We are at a crossroads. Not just any crossroads, but an existential one. Artificial Intelligence is no longer science fiction; it is the fog gathering on our path, redefining every...
Share on Facebook Share on LinkedIn Share on X

SharePoint Exploits Are Underway: Businesses and Organizations in the Crosshairs

The threat landscape never sleeps, but this time it woke up with a bang. On July 18, 2025, security firm Eye Security issued a warning that immediately resonated throughout the...
Share on Facebook Share on LinkedIn Share on X

A hacker compromises Amazon Q. Data is erased from users’ computers with a prompt from Wiper.

A hacker compromised the digital assistant Q by injecting commands that instructed it to wipe data from users' computers. Amazon included the update in its public release. Amazon Q is...
Share on Facebook Share on LinkedIn Share on X

Deepfake: Every citizen owns the copyright to their own face and voice.

Artificial intelligence-generated fakes have now crossed the threshold between reality and fantasy. Increasingly credible and insidious, these video and audio fakes are becoming increasingly dangerous. Their potential for harm is...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Webrat Malware Targets Security Researchers with GitHub Exploit Traps
Redazione RHC - 24/12/2025

There’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…

Immagine del sitoCybercrime
A backdoor in NVIDIA code. Three 9.8 bugs plague AI and robotics development systems
Redazione RHC - 24/12/2025

When it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…

Immagine del sitoCybercrime
La Poste Hit by Pro-Russian DDoS Attack During Peak Holiday Season
Redazione RHC - 23/12/2025

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…

Immagine del sitoVulnerability
CVE-2025-47761: FortiClient VPN Zero-Day Exploit Lets Privilege Escalation
Manuel Roccon - 23/12/2025

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…

Immagine del sitoCybercrime
Critical MongoDB Vulnerability Exposed: CVE-2025-14847
Redazione RHC - 23/12/2025

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…