Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Ransomfeed 320x100 1
Crowdstriker 970×120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Security Alert: Vulnerability in Ivanti Endpoint Manager Mobile. CISA Warns Cybercrime

Security Alert: Vulnerability in Ivanti Endpoint Manager Mobile. CISA Warns

The U.S. Cybersecurity Agency (CISA) has issued an alert regarding two malware kits discovered on the network of an unidentified...
Redazione RHC - 21 September 2025
Root in less than two minutes: How Phoenix exploits vulnerabilities in DDR5 module TRRs. Cybercrime

Root in less than two minutes: How Phoenix exploits vulnerabilities in DDR5 module TRRs.

Anew variant of Rowhammer attacks has been developed that can bypass the latest security mechanisms in SK Hynix DDR5 chips....
Redazione RHC - 20 September 2025
China kicks off the race for innovation with its first AI competition Cybercrime

China kicks off the race for innovation with its first AI competition

The city of Karamay, Xinjiang, hosted the opening of the finals and exhibition of the first AI Applications Competition. The...
Redazione RHC - 20 September 2025
A major cyberattack hits European airports. Flights grounded. Cybercrime

A major cyberattack hits European airports. Flights grounded.

On Saturday, September 20, 2025, a cyberattack hit a service provider used by several European airports, including Brussels, Berlin, and...
Redazione RHC - 20 September 2025
Submarine Cables: Japan Declares War on Chinese Suppliers Cybercrime

Submarine Cables: Japan Declares War on Chinese Suppliers

After the United States decided to restrict access to undersea communications cables using Chinese technology, Japan also initiated a plan...
Redazione RHC - 20 September 2025
A social network made entirely of bots! The University of Amsterdam experiment Cybercrime

A social network made entirely of bots! The University of Amsterdam experiment

Researchers at the University of Amsterdam conducted a novel experiment, creating a social network populated exclusively by artificial intelligence bots....
Redazione RHC - 20 September 2025

Sophos fixes vulnerabilities in Intercept X for Windows

Sophos announced that it has resolved three separate security vulnerabilities in Sophos Intercept X for Windows and its installer. These vulnerabilities, designated CVE-2024-13972, CVE-2025-7433, and CVE-2025-7472, have been rated High...
Share on Facebook Share on LinkedIn Share on X

Three score 10 bugs have been detected in Cisco ISE and ISE-PIC: urgent updates required.

Several vulnerabilities have been identified in the Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) products that could allow a remote attacker to execute arbitrary commands...
Share on Facebook Share on LinkedIn Share on X

OMGCable: The Thin Red Line Between Penetration Testing and Covert Surveillance

In 2021, during one of my explorations into the increasingly blurred boundary between hardware and cybersecurity, I wrote an article with a title that today sounds almost prophetic: “Even a...
Share on Facebook Share on LinkedIn Share on X

Live Ransomware Attack Video! HackerHood’s Workshop for Omnia and WithSecure

HackerHood, Red Hot Cyber's team of ethical hackers, has created something rarely seen outside of the most exclusive conferences: a live workshop demonstrating, step by step, a complete ransomware attack....
Share on Facebook Share on LinkedIn Share on X

Google Chrome emergency fix for critical bug that leads to sandbox escape

Google has released an emergency update for the Chrome browser, simultaneously eliminating six vulnerabilities, one of which is already actively exploited in real-world attacks. The issue affects critical components associated...
Share on Facebook Share on LinkedIn Share on X

Inside Operation Eastwood: The Shadows of Cyberterrorism and Propaganda

The international "Eastwood" operation represents a watershed moment in the fight against cyberterrorism. For the first time, a coordinated global operation has dealt a severe blow to one of the...
Share on Facebook Share on LinkedIn Share on X

More and more malware is hiding in DNS records. The new frontier is also for AI.

Hackers have learned to hide malware in places where it is virtually impossible to trace: in DNS records that connect domain names to IP addresses. This technique allows them to...
Share on Facebook Share on LinkedIn Share on X

The Computer Science degree is changing! 18 months to rewrite your resume.

With the unstoppable advance of artificial intelligence in the education system, American colleges and universities are profoundly rethinking computer science courses. The goal? To promote not only AI literacy, but...
Share on Facebook Share on LinkedIn Share on X

The new version of the Konfety malware uses advanced evasion techniques

A new version of the Android malware called Konfety has become even more sophisticated: specialists at Zimperium zLabs have discovered an improved variant that uses non-standard ZIP archives and loads...
Share on Facebook Share on LinkedIn Share on X

Xlibre and Wayback: Two Linux Projects Clash Over X.org’s Legacy

The Linux ecosystem is once again in the spotlight, with a fork of the good old X.org taking center stage. The new project, called Xlibre, was launched by German developer...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Webrat Malware Targets Security Researchers with GitHub Exploit Traps
Redazione RHC - 24/12/2025

There’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…

Immagine del sitoCybercrime
A backdoor in NVIDIA code. Three 9.8 bugs plague AI and robotics development systems
Redazione RHC - 24/12/2025

When it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…

Immagine del sitoCybercrime
La Poste Hit by Pro-Russian DDoS Attack During Peak Holiday Season
Redazione RHC - 23/12/2025

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…

Immagine del sitoVulnerability
CVE-2025-47761: FortiClient VPN Zero-Day Exploit Lets Privilege Escalation
Manuel Roccon - 23/12/2025

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…

Immagine del sitoCybercrime
Critical MongoDB Vulnerability Exposed: CVE-2025-14847
Redazione RHC - 23/12/2025

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…