Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Red Hot Cyber Academy

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Red Hot Cyber Conference 2026: Sponsorships Open for the Fifth Edition in Rome
Di Redazione RHC - 04/09/2025

The Red Hot Cyber Conference has become a regular event for the Red Hot Cyber community and for anyone working in or interested in the world of digital technologies and cybersecurity. The fifth editio...

Hexstrike AI unleashes chaos! Zero-days exploited in record time
Di Redazione RHC - 04/09/2025

The release of Hexstrike-AI marks a turning point in the cybersecurity landscape. The framework, billed as a next-generation tool for red teams and researchers, is capable of orchestrating over 150 sp...

LockBit 5.0: Signs of a New and Possible “Rebirth”?
Di Pietro Melillo - 03/09/2025

LockBit represents one of the longest-running and most structured ransomware gangs of recent years, with a Ransomware-as-a-Service (RaaS) model that has profoundly impacted the criminal ecosystem. Fol...

The KING of DDoS! Cloudflare blocks a monstrous 11.5 terabit-per-second attack.
Di Redazione RHC - 03/09/2025

The record for the largest DDoS attack ever recorded in June 2025 has already been broken. Cloudflare said it recently blocked the largest DDoS attack in history, which peaked at 11.5 Tbps. “Cloudfl...

Palo Alto Networks Also Compromised via Salesforce and Drift
Di Antonio Piazzolla - 02/09/2025

In early September 2025, Palo Alto Networks confirmed it had been the victim of a data breach. The compromise did not affect its core products or services, but rather some internally used Salesforce i...

Vibe Coding: Revolution or Security Risk?

Martyn Ditchburn, CTO in residence Zscaler Artificial intelligence, like any technology, is not inherently good or bad: it all depends on who uses ...
Redazione RHC - 28/08/2025 - 14:36

Critical vulnerabilities in NetScaler ADC and Gateway. Update now! Attacks are ongoing!

NetScaler has alerted administrators of three new vulnerabilities in NetScaler ADC and NetScaler Gateway, one of which is already being used in active...
Redazione RHC - 28/08/2025 - 14:02

The Democratization of Cybercrime Has Arrived! “I Can’t Code, But I Write Ransomware”

Cybercriminals are rapidly mastering generative AI, and we're no longer talking about "scary" ransom notes, but about full-fledged malware development...
Redazione RHC - 28/08/2025 - 13:55

FreePBX under attack: Zero-day exploit already in use, emergency patch released

The world of VoIP telephony has once again ended up in the crosshairs of cybercriminals. This time it's FreePBX, the open-source platform built on Ast...
Luca Galuppi - 28/08/2025 - 13:39

Storm-0501: When Ransomware Moves to the Cloud

Microsoft is raising the alarm: the Storm-0501 cybercriminal group has evolved. No more "traditional" attacks on on-premise machines, no more ransomwa...
Luca Galuppi - 28/08/2025 - 10:52

Microsoft Teams crashes: Embedded Office documents blocked from opening

A Black Thursday for millions of Microsoft Teams users around the world. A key feature of the collaboration platform – opening embedded Office documen...
Luca Galuppi - 28/08/2025 - 08:45
1 12 13 14 15 16 125

Navy and Marine Corps test hydrogen balloon and drone surveillance system

- August 31st, 2025

At Outlying Landing Field Seagle in California, the U.S. Navy and Marine Corps tested a new system that allows ships to "see beyond the horizon." From May 19 to 21,...

  

Microsoft denies that the August update damaged SSDs: Users say otherwise.

- August 31st, 2025

Microsoft has denied that the August Windows 11 security update is linked to mass complaints of storage device failures. The investigation was launched following reports from users who, after installing...

  

GitHub and GitLab are increasingly under fire! Targeted attacks targeting developers via fake repositories

- August 31st, 2025

By hosting fake projects on popular development platforms (GitHub and GitLab), attackers trick users into running malicious payloads that pull add-ons from a hacker-controlled repository. As a result, remote access...

  

Meta’s AI bots use avatars of minors and celebrities: a storm erupts.

- August 31st, 2025

Meta found itself at the center of a scandal after a Reuters investigation revealed that AI-powered chatbots that mimicked celebrities were being distributed on the company's platforms. These virtual characters,...

  

Sign up for the newsletter