Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320x100 Itcentric
970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Vibe coding, yes, but be careful. Speed doesn’t always beat quality. Cybercrime

Vibe coding, yes, but be careful. Speed doesn’t always beat quality.

There's a new phenomenon in the programming industry: vibe coding. Developers are increasingly using artificial intelligence agents to speed up...
Redazione RHC - 16 September 2025
The Great Firewall in the Spotlight: The Leak Revealing the Industrialization of Chinese Censorship Cybercrime

The Great Firewall in the Spotlight: The Leak Revealing the Industrialization of Chinese Censorship

Edited by Luca Stivali and Olivia Terragni. On September 11, 2025, what can be defined as the largest leak ever...
Redazione RHC - 16 September 2025
Jaguar Land Rover cyberattack leaves $50 million in losses Cybercrime

Jaguar Land Rover cyberattack leaves $50 million in losses

The cyber attack on Jaguar Land Rover, which paralyzed the company's operations, has become one of the most serious crises...
Redazione RHC - 16 September 2025
Microsoft accused by Ron Wyden of cybersecurity negligence Cybercrime

Microsoft accused by Ron Wyden of cybersecurity negligence

US Senator Ron Wyden sent a letter on September 10 to the Federal Trade Commission (FTC) requesting an investigation into...
Redazione RHC - 16 September 2025
CrowdStrike and Meta launch CyberSOCEval to evaluate AI in cybersecurity Cybercrime

CrowdStrike and Meta launch CyberSOCEval to evaluate AI in cybersecurity

CrowdStrike today introduced, in collaboration with Meta, a new benchmark suite - CyberSOCEval - to evaluate the performance of artificial...
Redazione RHC - 15 September 2025
EvilAI: Malware that uses artificial intelligence to bypass security Cybercrime

EvilAI: Malware that uses artificial intelligence to bypass security

A new EvilAI malware campaign tracked by Trend Micro has demonstrated how artificial intelligence is increasingly becoming a tool for...
Redazione RHC - 15 September 2025

DarkForums Takes Over BreachForums’ Telegram Channel “The Jacuzzi”

The underground landscape of cybercriminal forums continues to evolve and is changing. With an official announcement published on June 25, 2025 both on Telegram and within the DarkForums forum, the...
Share on Facebook Share on LinkedIn Share on X

Patch Chaos: Windows 11 Update Breaks PDF Printing

Yes, once again a Windows update has unleashed hell. The harmless “Microsoft Print to PDF” function, a silent ally of users and IT administrators for years, has ended up KO...
Share on Facebook Share on LinkedIn Share on X

The symbol of the hacker community: today we talk about the Glider.

The hacker culture is a fascinating subject. It is a rich mine of outlandish innovation, genius and intuition. Of bizarre characters, of fatalistic humor, of memes, but above all culture,...
Share on Facebook Share on LinkedIn Share on X

The hacker group LOpht predicted the future of the Internet in 1998, but the US didn’t listen to them.

"If you're looking for computer security, then the Internet is not the place to be." Said Mudge, then 27, with the look of a biblical prophet with long brown hair...
Share on Facebook Share on LinkedIn Share on X

Linux Pwned! Privilege Escalation on SUDO in 5 seconds. HackerHood tests the CVE-2025-32463 exploit

Yesterday, Red Hot Cyber published an in-depth analysis of a gserious vulnerability discovered in SUDO (CVE-2025-32463), which allows escalation of privileges to root in Linux environments by exploiting an abuse...
Share on Facebook Share on LinkedIn Share on X

North Korean Hackers on the Payroll: How Companies Paid Salaries to North Korean IT Specialists

The US Department of Justice has announced the discovery ofa large-scale scheme in which fake IT specialists from the DPRK obtained jobs at American companies by posing as citizens of...
Share on Facebook Share on LinkedIn Share on X

The Story of Open Source: A Success Story of Humankind

Author: Massimiliano Brolli, Pietro CornelioPublishing Date: 11/01/2021 Open source software is so present and integrated into our daily lives today that it would be difficult to think of a world...
Share on Facebook Share on LinkedIn Share on X

Do you really know what Hacktivism means? It’s a “special message of hope!”

“Hacktivism, a special message of hope." Thus begins the "Hacktivism Declaration", published on July 4, 2001 by the famous hacker group Cult of the dead Cow (also called cDc or...
Share on Facebook Share on LinkedIn Share on X

The History of FreeBSD

We have often talked about Linux and the open source world, Windows and proprietary software and operating systems in general. But starting from the seed of Ken Thompson's Unix, many...
Share on Facebook Share on LinkedIn Share on X

HoneyPLC: the new honeypot that revolutionizes the defense of industrial plants

Industrial Control Systems (ICS), critical to the operation of critical infrastructure such as power, water and transportation networks, are increasingly vulnerable to cyberattacks. In this context, the article HoneyPLC: A...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
A $500 Tool Claims to Kill EDRs at Kernel Level: Inside the NtKiller Underground Ad
Redazione RHC - 25/12/2025

An ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…

Immagine del sitoCybercrime
Webrat Malware Targets Security Researchers with GitHub Exploit Traps
Redazione RHC - 24/12/2025

There’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…

Immagine del sitoCybercrime
A backdoor in NVIDIA code. Three 9.8 bugs plague AI and robotics development systems
Redazione RHC - 24/12/2025

When it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…

Immagine del sitoCybercrime
La Poste Hit by Pro-Russian DDoS Attack During Peak Holiday Season
Redazione RHC - 23/12/2025

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…

Immagine del sitoVulnerability
CVE-2025-47761: FortiClient VPN Zero-Day Exploit Lets Privilege Escalation
Manuel Roccon - 23/12/2025

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…