Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320x100 Itcentric
LECS 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

First malware with integrated GPT-4 discovered: MalTerminal arrives Cybercrime

First malware with integrated GPT-4 discovered: MalTerminal arrives

SentinelLABS researchers have discovered what they describe as the first known example of malware with integrated LLM functionality , dubbed...
Redazione RHC - 22 September 2025
The winners of the AI race? Electricians and plumbers. Cybercrime

The winners of the AI race? Electricians and plumbers.

In an interview with Channel 4 News, Nvidia CEO Jensen Huang said that in the race to succeed in the...
Redazione RHC - 22 September 2025
SonicWall warns customers to change credentials after security breach Cybercrime

SonicWall warns customers to change credentials after security breach

SonicWall has warned its customers to change their login credentials as soon as possible. A cyberattack on MySonicWall accounts compromised...
Redazione RHC - 22 September 2025
“He doesn’t understand me, but ChatGPT does”: The 21st-century love triangle Cybercrime

“He doesn’t understand me, but ChatGPT does”: The 21st-century love triangle

The American magazine Futurism has described a new conflict at the intersection of technology and personal life: artificial intelligence bots...
Redazione RHC - 22 September 2025
Major DarkForums Leak: 196 Italian Sites Exposed with Clear FTP Credentials Cybercrime

Major DarkForums Leak: 196 Italian Sites Exposed with Clear FTP Credentials

On September 20, 2025, at 11:52 PM, a thread titled “FRESH FTP LEAK” appeared on DarkForums , posted by user...
Luca Stivali - 22 September 2025
From Leash to Autonomy: Ban, Nvidia Block, and Huawei’s AI Cluster Solutions Cybercrime

From Leash to Autonomy: Ban, Nvidia Block, and Huawei’s AI Cluster Solutions

China's Huawei has taken a major step in developing its own artificial intelligence infrastructure. The company has unveiled solutions designed...
Redazione RHC - 22 September 2025

Patch Management: The process to adopt to make your company more secure from cyber attacks

"In the dark forest of the digital world" (as Dante Alighieri would say today), cybersecurity has become a top priority for companies of all sizes. Constant cyber attacks make headlines...
Share on Facebook Share on LinkedIn Share on X

What are security bugs? A journey through PoCs, exploits, bug bounty programs, and work.

A security bug, also known as a computer security bug, is a type of error or flaw in software that can be exploited by an attacker to compromise the security...
Share on Facebook Share on LinkedIn Share on X

Vulnerability in 7-Zip: Attackers can perform denial-of-service attacks

A critical security flaw related to memory corruption has been discovered in the popular 7-Zip archiver. This vulnerability can be exploited by attackers to cause denial-of-service conditions by creating malicious...
Share on Facebook Share on LinkedIn Share on X

ToolShell: The New Threat Affecting Microsoft SharePoint Servers

An advanced cyberattack campaign has been detected targeting Microsoft SharePoint servers. This threat exploits a series of vulnerabilities, known as "ToolShell," which allows attackers to gain complete and remote control...
Share on Facebook Share on LinkedIn Share on X

Uncle Bot, the humanoid robot that’s conquering China and scaring the US

A humanoid robot dressed in casual clothes, resembling an average man, has gained unexpected popularity in China. Nicknamed "Uncle Bot on the internet, it rose to fame thanks to a...
Share on Facebook Share on LinkedIn Share on X

Viral Minds: How the Internet Turned Social Contagion Into a Global Psychological Weapon

Stop scrolling for a moment and look around you. Every meme, every viral video, every outrage-fueled hashtag, are you sure you chose them? Or did they choose you? We like...
Share on Facebook Share on LinkedIn Share on X

Millions of vehicles at risk of RCE attacks via the PerfektBlue Bluetooth bug

Four vulnerabilities, dubbed PerfektBlue, affect OpenSynergy's Bluetooth BlueSDK stack. The vulnerabilities allow remote execution of arbitrary code and could contribute to accessing critical components in vehicles from manufacturers such as...
Share on Facebook Share on LinkedIn Share on X

Mercedes-Benz and Microsoft are teaming up to integrate Teams and Copilot 365 into cars starting this summer.

On July 16, Mercedes-Benz announced in a press release the expansion of its collaboration with Microsoft, introducing the latest Office solutions and collaboration tools, including an updated version of the...
Share on Facebook Share on LinkedIn Share on X

What is ICT Risk Management? A process that supports cybersecurity.

ICT Risk Management is a process that identifies, assesses, and manages risks related to the use of information and communications technologies (ICT). It is a fundamental aspect for any organization...
Share on Facebook Share on LinkedIn Share on X

How to Start a Cyber Security Program: The First Steps

Cybersecurity has become a crucial component for protecting corporate information and sensitive data. Starting a cybersecurity program is not only a necessity, but a must for any organization that wants...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Webrat Malware Targets Security Researchers with GitHub Exploit Traps
Redazione RHC - 24/12/2025

There’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…

Immagine del sitoCybercrime
A backdoor in NVIDIA code. Three 9.8 bugs plague AI and robotics development systems
Redazione RHC - 24/12/2025

When it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…

Immagine del sitoCybercrime
La Poste Hit by Pro-Russian DDoS Attack During Peak Holiday Season
Redazione RHC - 23/12/2025

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…

Immagine del sitoVulnerability
CVE-2025-47761: FortiClient VPN Zero-Day Exploit Lets Privilege Escalation
Manuel Roccon - 23/12/2025

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…

Immagine del sitoCybercrime
Critical MongoDB Vulnerability Exposed: CVE-2025-14847
Redazione RHC - 23/12/2025

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…