Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Redhotcyber Banner Sito 320x100px Uscita 101125
2nd Edition GlitchZone RHC 970x120 2

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Google Chrome: Urgent patch for exploited 0day. Critical vulnerabilities fixed. Cybercrime

Google Chrome: Urgent patch for exploited 0day. Critical vulnerabilities fixed.

Google has taken immediate security action for Chrome browser users globally, targeting four critical vulnerabilities, one of which, a zero-day...
Redazione RHC - 18 September 2025
Phishing with style! Cybercriminals attach superhero GIFs to malware. Cybercrime

Phishing with style! Cybercriminals attach superhero GIFs to malware.

F6 analysts have published a study on a new phishing campaign active from spring 2025. The group, dubbed ComicForm, sent...
Redazione RHC - 18 September 2025
Will this latest article “against” ChatControl be absolutely useless? Cybercrime

Will this latest article “against” ChatControl be absolutely useless?

We had already discussed the proposed "ChatControl" regulation almost two years ago, but given the roadmap currently underway, we find...
Stefano Gazzella - 18 September 2025
Azure Functions in the Spotlight: Legitimate Libraries Used for DLL Sideloading Cybercrime

Azure Functions in the Spotlight: Legitimate Libraries Used for DLL Sideloading

A malicious version of the ISO image named Servicenow-BNM-Verify.iso has been identified on VirusTotal, reported as originating from Malaysia, with...
Redazione RHC - 18 September 2025
Linux Hit by Sindoor Dropper: Highly Obfuscated Infection Chain Cybercrime

Linux Hit by Sindoor Dropper: Highly Obfuscated Infection Chain

Linux systems are being targeted by a recent malware campaign, known as "Sindoor Dropper," which uses advanced spear-phishing techniques and...
Redazione RHC - 18 September 2025
A manifesto after 72 hours! Will cybercriminals really retreat? Cybercrime

A manifesto after 72 hours! Will cybercriminals really retreat?

Fifteen of the most notorious cybercriminal groups, including Scattered Spider, ShinyHunters, and Lapsus$, have announced their closure. Their collective statement,...
Redazione RHC - 18 September 2025

A RCE vulnerability in Wing FTP Server rated 10 opens the door to 10,000 companies.

Huntress researchers have detected active exploitation of a critical vulnerability in Wing FTP Server, just one day after its public disclosure. The vulnerability CVE-2025-47812 has been assigned the highest severity...
Share on Facebook Share on LinkedIn Share on X

There’s no such thing as zero risk! There’s only one risk you need to know to manage.

Cybersecurity is a critically important topic for companies and organizations of all sizes and industries. As business operations and information management become increasingly digital, the risk of cyberattacks has become...
Share on Facebook Share on LinkedIn Share on X

Working in cybersecurity. Cybersecurity needs you.

We know it by now. Every country in the world (including Italy) has a huge shortage of cybersecurity experts, while cybercrime is rampant in every corner of the globe. This...
Share on Facebook Share on LinkedIn Share on X

What is cyber warfare? Between geopolitics, economics, and technology.

Cyber warfare is a form of conflict that takes place at the cyber and digital level. This form of warfare has become increasingly widespread in recent years, thanks to the...
Share on Facebook Share on LinkedIn Share on X

AI stymied by energy constraints, innovative space solutions needed

During an interview on the Manifold podcast, Omar Shams, head of the Google Agents project, emphasized that besides chips, the other major limitation to AI development is energy. It's often...
Share on Facebook Share on LinkedIn Share on X

Donald Trump admits the US is hacking China: “That’s the way of the world.”

President Donald Trump briefly left Maria Bartiromo speechless during an interview when he insinuated that the United States was hacking Chinese systems. The president highlighted the "large trade deficit with...
Share on Facebook Share on LinkedIn Share on X

TapTrap Attack: How to Get Yourself to Click Things Even Your Mom Wouldn’t Approve of

TapTrap exploits user interface animations to bypass Android's permissions system, allowing it to access sensitive data or trick the user into performing destructive actions, such as factory resetting the device....
Share on Facebook Share on LinkedIn Share on X

AI will end the traditional software industry just as the Internet has changed traditional media.

Generative AI, including tools like Cursor and ClaudeCode, are dramatically reducing the cost and time of software development. What once cost hundreds or thousands of dollars per token can now...
Share on Facebook Share on LinkedIn Share on X

Critical Vulnerability in the Linux Kernel: A New Privilege Escalation

A critical double-free vulnerability has been discovered in the pipapo set module of the NFT subsystem of the Linux kernel. An unprivileged attacker can exploit this vulnerability by sending a...
Share on Facebook Share on LinkedIn Share on X

RHC interviews Sector16, one of the most active hacktivist groups of 2025. “Let’s destroy the present for a better future”

In recent months, two disturbing episodes have shaken public opinion and the Italian cybersecurity sector. The first concerned an Italian hospital, violated in its most sensitive heart: videos of patients...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
A $500 Tool Claims to Kill EDRs at Kernel Level: Inside the NtKiller Underground Ad
Redazione RHC - 25/12/2025

An ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…

Immagine del sitoCybercrime
Webrat Malware Targets Security Researchers with GitHub Exploit Traps
Redazione RHC - 24/12/2025

There’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…

Immagine del sitoCybercrime
A backdoor in NVIDIA code. Three 9.8 bugs plague AI and robotics development systems
Redazione RHC - 24/12/2025

When it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…

Immagine del sitoCybercrime
La Poste Hit by Pro-Russian DDoS Attack During Peak Holiday Season
Redazione RHC - 23/12/2025

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…

Immagine del sitoVulnerability
CVE-2025-47761: FortiClient VPN Zero-Day Exploit Lets Privilege Escalation
Manuel Roccon - 23/12/2025

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…