Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Ancharia Mobile 1
970x20 Itcentric

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Discipline your email first so you don’t regret it later Culture

Discipline your email first so you don’t regret it later

Managing employee email inboxes is often overlooked by organizations, despite the widespread use of email and its significant impact on...
Stefano Gazzella - 22 September 2025
Mathematical Security: From Number Theory to Hacking and Pentesting Culture

Mathematical Security: From Number Theory to Hacking and Pentesting

When we talk about cybersecurity, we immediately think of firewalls, malware, and zero-day exploits. But there's a deeper level, unseen...
Diego Bentivoglio - 22 September 2025
Elon Musk unveils Colossus II, the one-gigawatt AI supercomputer Cybercrime

Elon Musk unveils Colossus II, the one-gigawatt AI supercomputer

Elon Musk shared a photo of the complex housing Colossus II, the world's first gigawatt-scale AI cluster. Elon Musk has...
Redazione RHC - 22 September 2025
Vulnerability in Windows RPC protocol: Spoofing and impersonation attacks reported Cybercrime

Vulnerability in Windows RPC protocol: Spoofing and impersonation attacks reported

SafeBreach experts have disclosed details of a vulnerability in the Windows Remote Procedure Call (RPC) protocol, patched by Microsoft in...
Redazione RHC - 21 September 2025
Patchwork Launches Spear-Phishing Campaign Against Turkish Defense Cybercrime

Patchwork Launches Spear-Phishing Campaign Against Turkish Defense

The Patchwork group, also known by the aliases APT-C-09, APT-Q-36, Chinastrats, Dropping Elephant, Operation Hangover, Quilted Tiger, and Zinc Emerson...
Redazione RHC - 21 September 2025
Hackers don’t want to save you: they want to erase you. Cybercrime

Hackers don’t want to save you: they want to erase you.

Hackers are increasingly targeting backups – not systems or servers, but the data that companies retain for a limited period...
Redazione RHC - 21 September 2025

What are Side Channel Attacks? How they work and how to defend data from cyber threat physics.

Side Channel Attacks represent a sophisticated category of cyber threats that focus on weaknesses in security systems. These attacks differ from traditional techniques based on brute force or software vulnerabilities,...
Share on Facebook Share on LinkedIn Share on X

What is Phishing as a Service (PaaS). Let’s explore cybercrime services and access some underground resources.

"Phishing as a service" (PaaS) is a type of service offered by cybercriminals or illicit service providers that simplifies and automates the entire process of creating and distributing phishing attacks...
Share on Facebook Share on LinkedIn Share on X

What is a False Flag in Cybersecurity: From its Origins to Its Use in Malware and National Security Attacks

In the vast world of cybersecurity, an often controversial and highly intriguing practice is that of "false flags." This term, originally used in the context of military operations and intelligence,...
Share on Facebook Share on LinkedIn Share on X

Chinese humanoid robot replaces its own battery and works 24 hours a day

The presentation of the Walker S2 represents a major step forward in the operational autonomy of humanoid robots. Thanks to the ability to autonomously replace its own battery, the robot...
Share on Facebook Share on LinkedIn Share on X

Gmail introduces Shielded Email. Temporary email to fight spam and protect your privacy.

Google continues to actively develop Gmail, adding new features with elements of artificial intelligence to the email service. These updates make using email more convenient, but at the same time,...
Share on Facebook Share on LinkedIn Share on X

Google files suit against the BadBox2.0 botnet! A thought-provoking lawsuit against unknown individuals

Google has filed a lawsuit against the anonymous operators of the Android BadBox 2.0 botnet, accusing them of orchestrating a global fraud targeting the company's advertising platforms. BadBox is Android...
Share on Facebook Share on LinkedIn Share on X

Jen-Hsun Huang: “I was born Chinese and became Chinese-American.” The ban on AI chips in China is a grave mistake.

According to Fast Technology on July 18, Jen-Hsun Huang told Chinese media about his origins, explaining that he was born Chinese and then became Chinese-American. He emphasized how China is...
Share on Facebook Share on LinkedIn Share on X

What is Social Engineering? Uncovering an increasingly pervasive threat.

Social engineering is a psychological manipulation technique used to gain unauthorized access or information. Attackers exploit people's natural tendency to rely on trust and courtesy to convince them to provide...
Share on Facebook Share on LinkedIn Share on X

The World of Cybercrime: From Profit-Seeking Criminals to Hacktivists and State-Owned Hackers

The increasingly widespread use of digital technologies has opened up new opportunities for cybercriminals operating online, giving rise to a veritable cybercrime ecosystem. In this context, various actors can jeopardize...
Share on Facebook Share on LinkedIn Share on X

What is cyber hacktivism? History, motivations, hacking, consequences, and evolution.

The term "hacktivism" is a combination of the English terms "hacking" and "hacktivism" and was coined to describe the use of computer hacking for political or social purposes. It is...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Webrat Malware Targets Security Researchers with GitHub Exploit Traps
Redazione RHC - 24/12/2025

There’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…

Immagine del sitoCybercrime
A backdoor in NVIDIA code. Three 9.8 bugs plague AI and robotics development systems
Redazione RHC - 24/12/2025

When it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…

Immagine del sitoCybercrime
La Poste Hit by Pro-Russian DDoS Attack During Peak Holiday Season
Redazione RHC - 23/12/2025

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…

Immagine del sitoVulnerability
CVE-2025-47761: FortiClient VPN Zero-Day Exploit Lets Privilege Escalation
Manuel Roccon - 23/12/2025

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…

Immagine del sitoCybercrime
Critical MongoDB Vulnerability Exposed: CVE-2025-14847
Redazione RHC - 23/12/2025

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…