Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Ancharia Mobile 1
Redhotcyber Banner Sito 970x120px Uscita 101125

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

DeepSeek under fire: 50% of malicious code produced on sensitive queries Cybercrime

DeepSeek under fire: 50% of malicious code produced on sensitive queries

Specialists at CrowdStrike conducted a series of experiments with the Chinese artificial intelligence system DeepSeek, testing its code generation based...
Redazione RHC - 20 September 2025
Russian influence network CopyCop creates over 300 websites to spread disinformation Cybercrime

Russian influence network CopyCop creates over 300 websites to spread disinformation

Since March 2025, Insikt Group of Recorded Future observed CopyCop (also known as Storm-1516), a covert Russian influence network, creating...
Redazione RHC - 20 September 2025
A former CIA agent sold state secrets for personal gain Cybercrime

A former CIA agent sold state secrets for personal gain

Former CIA agent Dale Britt Bandler is at the center of a high-profile criminal case: he used his access to...
Redazione RHC - 20 September 2025
Microsoft launches its “AI factory”: the most powerful supercomputer ever built. Cybercrime

Microsoft launches its “AI factory”: the most powerful supercomputer ever built.

Microsoft has unveiled a new generation of data centers designed specifically for artificial intelligence. The flagship facility is called Microsoft...
Redazione RHC - 19 September 2025
Critical vulnerability in Microsoft Login ID: risk of total takeover Cybercrime

Critical vulnerability in Microsoft Login ID: risk of total takeover

Microsoft has closed a critical bug that could have severely compromised its cloud environments: Dutch researcher Dirk-Jan Mollema discovered two...
Redazione RHC - 19 September 2025
Will you soon be fired? AI surpasses humans in the Coding Olympics. Cybercrime

Will you soon be fired? AI surpasses humans in the Coding Olympics.

Google DeepMind and OpenAI's artificial intelligence have achieved gold-level results in a competition dubbed the "Programming Olympics." The companies' models...
Redazione RHC - 19 September 2025

A study shows a shocking truth: 98.5% of passwords are weak!

In a new analysis based on 10 million compromised passwords, Specops has demonstrated how vulnerable corporate networks remain to human error. All passwords were extracted from a list of over...
Share on Facebook Share on LinkedIn Share on X

Operation Eastwood: Pro-Russian hacker group NoName057(16) dismantled

As part of the investigations conducted by the Rome Public Prosecutor's Office and coordinated by the National Anti-Mafia and Anti-Terrorism Directorate, the Postal Police has completed important investigative activities in...
Share on Facebook Share on LinkedIn Share on X

What is Doxing and How Can It Change Your Online Life?

Doxing (short for "dropping dox," sometimes written as Doxxing) is the act of revealing personal information about someone online, such as their real name, home address, workplace, phone number, financial...
Share on Facebook Share on LinkedIn Share on X

What are Botnets? A Journey Through Malware, Cyber Threat Intelligence, and OSINT

The Internet provides a sea of information. We often talk on RHC about Open Source Intelligence (OSINT) and Cyber Threat Intelligence (CTI), i.e. those intelligence disciplines that deal with the...
Share on Facebook Share on LinkedIn Share on X

Cloudflare: DDoS attacks decline in Q2 2025, but extreme attacks increase

Cloudflare recorded a sharp decline in DDoS attacks in the second quarter of 2025, blocking 7.3 million attacks, compared to the 20.5 million reported in the first quarter. Despite the...
Share on Facebook Share on LinkedIn Share on X
Misteriosi APT nell'ombra digitale: Un'immersione profonda nelle minacce cibernetiche altamente sofisticate. Scopri chi sono, cosa li muove e come proteggerti in questo viaggio attraverso il mondo delle Advanced Persistent Threat (APT)

What is an Advanced Persistent Threat (APT). A journey through malicious actors and state-sponsored hackers.

Advanced Persistent Threats (APTs) are malicious actors that operate in the shadows of the internet, conducting highly sophisticated and targeted attacks. These groups, often associated with nation-states, pose a significant...
Share on Facebook Share on LinkedIn Share on X

What are Distributed Denial of Service (DDoS) attacks and how can we protect ourselves from them?

Distributed Denial of Service (DDoS) attacks are one of the most common threats to websites, servers, and other online infrastructure. Specifically, this type of attack attempts to overwhelm target servers...
Share on Facebook Share on LinkedIn Share on X

The Inconvenient Truth About Work and AI: 99% Fight, 1% Win

On July 11, local time, it was revealed that Google DeepMind had successfully "recruited" the core team of AI startup Windsurf. Not long before, OpenAI was negotiating a $3 billion...
Share on Facebook Share on LinkedIn Share on X

Hackers use ClickFix and FileFix to spread the Interlock Trojan

The Interlock ransomware hacker group is distributing a remote access trojan (RAT) through compromised websites. Hackers use FileFix attacks to spread the malware. ClickFix attacks rely on social engineering. Several...
Share on Facebook Share on LinkedIn Share on X

Discovering Scattered Spider: The Criminal Threat Using Advanced Tactics and Techniques

By Cyber Defense Center Maticmind (Andrea Mariucci, Riccardo Michetti, Federico Savastano, Ada Spinelli) The Scattered Spider threat actor, UNC9344, made its appearance in 2022 with two targeted attacks on Caesars...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Webrat Malware Targets Security Researchers with GitHub Exploit Traps
Redazione RHC - 24/12/2025

There’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…

Immagine del sitoCybercrime
A backdoor in NVIDIA code. Three 9.8 bugs plague AI and robotics development systems
Redazione RHC - 24/12/2025

When it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…

Immagine del sitoCybercrime
La Poste Hit by Pro-Russian DDoS Attack During Peak Holiday Season
Redazione RHC - 23/12/2025

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…

Immagine del sitoVulnerability
CVE-2025-47761: FortiClient VPN Zero-Day Exploit Lets Privilege Escalation
Manuel Roccon - 23/12/2025

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…

Immagine del sitoCybercrime
Critical MongoDB Vulnerability Exposed: CVE-2025-14847
Redazione RHC - 23/12/2025

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…