Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
320x100 Itcentric
970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Microsoft Exchange Server Penetration Testing: Techniques, Tools, and Countermeasures
Di Alessandro Molinari - 06/11/2025

Often, during penetration testing, we find ourselves with elevated access (Domain Admin) within an organization. Some companies stop there, thinking that obtaining Domain Admin is the ultimate goal. B...

Immagine del sito
Notepad++ under attack! How a fake DLL opens the door to criminal hackers
Di Manuel Roccon - 06/11/2025

A new vulnerability affecting Notepad++ was released in September. The vulnerability has been identified as CVE-2025-56383, and details can be found on the NIST website. CVE-2025-56383 is a DLL hijack...

Immagine del sito
A dangerous zero-day zero-click exploit threatens billions of Android devices
Di Redazione RHC - 05/11/2025

Google has issued an urgent advisory regarding a critical vulnerability in Android that allows attackers to execute arbitrary code on the device without any user interaction. The Zero Click vulnerabil...

Immagine del sito
Does Microsoft use macOS to create Windows wallpapers? Probably!
Di Redazione RHC - 04/11/2025

On October 29, Microsoft released a wallpaper to commemorate the eleventh anniversary of the Windows Insider program, and it is speculated that it was created using macOS. Let us remember that Windows...

Immagine del sito
Louvre Theft: Windows 2000 and Windows XP on Networks, as Well as Simple Passwords
Di Redazione RHC - 04/11/2025

As we know, the thieves in the “theft of the century” entered through a second-floor window of the Louvre Museum, but the museum had other problems besides unprotected windows. Although Cu...

From Body to Screen: How Sexual Abuse Has Moved to the Digital World

This is the second in a series of articles analyzing gender-based violence in the digital context, in anticipation of November 25th, the International...
Paolo Galdieri - 28/10/2025 - 07:07

Apache Tomcat Vulnerability: Update Now to Avoid Security Risks

Many web applications rely on Apache Tomcat, a widely used open-source Java servlet container. On October 27, 2025, Apache disclosed two vulnerabiliti...
Redazione RHC - 28/10/2025 - 06:52

Paycheck piracy is coming! And the paycheck transfer goes to criminals.

According to a new report from Microsoft Threat Intelligence , the financially motivated Storm-2657 group is conducting large-scale attacks against un...
Redazione RHC - 28/10/2025 - 06:40

CrowdStrike: 76% of organizations struggle to combat AI attacks

Enterprises are lagging behind in ransomware preparedness as adversaries use AI across the attack chain to accelerate intrusion, encryption and extort...
Redazione RHC - 28/10/2025 - 06:30

Whisper 2FA: The New Phishing Tool That Steals Microsoft 365 Credentials

According to new research from Barracuda Networks , a particularly insidious and persistent new Phishing-as-a-Service (PhaaS) kit is stealing credenti...
Redazione RHC - 27/10/2025 - 17:45

Microsoft Teams will spy on your boss when you’re out of the office! Location tracking will be rolled out in December.

Microsoft Teams will receive an update in December 2025 that will allow you to track employee locations over your office Wi-Fi network. According to t...
Redazione RHC - 27/10/2025 - 13:47
1 13 14 15 16 17 222

From Body to Screen: How Sexual Abuse Has Moved to the Digital World

- October 28th, 2025

This is the second in a series of articles analyzing gender-based violence in the digital context, in anticipation of November 25th, the International Day for the Elimination of Violence against...

Facebook Linkedin X

Apache Tomcat Vulnerability: Update Now to Avoid Security Risks

- October 28th, 2025

Many web applications rely on Apache Tomcat, a widely used open-source Java servlet container. On October 27, 2025, Apache disclosed two vulnerabilities: CVE-2025-55752 and CVE-2025-55754, affecting several versions of Tomcat....

Facebook Linkedin X

Paycheck piracy is coming! And the paycheck transfer goes to criminals.

- October 28th, 2025

According to a new report from Microsoft Threat Intelligence , the financially motivated Storm-2657 group is conducting large-scale attacks against universities and businesses , using stolen employee accounts to redirect...

Facebook Linkedin X

CrowdStrike: 76% of organizations struggle to combat AI attacks

- October 28th, 2025

Enterprises are lagging behind in ransomware preparedness as adversaries use AI across the attack chain to accelerate intrusion, encryption and extortion. Milan – October 27, 2025 – According to CrowdStrike...

Facebook Linkedin X

Whisper 2FA: The New Phishing Tool That Steals Microsoft 365 Credentials

- October 27th, 2025

According to new research from Barracuda Networks , a particularly insidious and persistent new Phishing-as-a-Service (PhaaS) kit is stealing credentials and authentication tokens from Microsoft 365 users. Barracuda experts have...

Facebook Linkedin X

Microsoft Teams will spy on your boss when you’re out of the office! Location tracking will be rolled out in December.

- October 27th, 2025

Microsoft Teams will receive an update in December 2025 that will allow you to track employee locations over your office Wi-Fi network. According to the Microsoft 365 roadmap , "when...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE