Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320x100 Itcentric
Fortinet 970x120px

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

There’s no antivirus to protect you! ModStealer affects Windows, macOS, and Linux. Cybercrime

There’s no antivirus to protect you! ModStealer affects Windows, macOS, and Linux.

Mosyle has discovered a new malware program called ModStealer. The program is completely undetectable by antivirus solutions and was first...
Redazione RHC - 15 September 2025
From the Vatican to Facebook with fury: the miracle of a divine scam! Cybercrime

From the Vatican to Facebook with fury: the miracle of a divine scam!

In recent years, online scams have taken on increasingly sophisticated forms, exploiting not only social engineering techniques but also the...
Redazione RHC - 15 September 2025
Mustang Panda, New SnakeDisk Cyber Attack Targeting Thailand Cybercrime

Mustang Panda, New SnakeDisk Cyber Attack Targeting Thailand

IBM X-Force researchers have discovered new operations by the Chinese group Hive0154, better known as Mustang Panda. Experts have documented...
Redazione RHC - 15 September 2025
Goodbye, Windows 10! Microsoft warns that updates will end on October 14th. Cybercrime

Goodbye, Windows 10! Microsoft warns that updates will end on October 14th.

Microsoft reminded users that support for the beloved Windows 10 will end in a month. Starting October 14, 2025, the...
Redazione RHC - 15 September 2025
BitLocker in the crosshairs: stealth attacks via COM hijacking. Online PoC Cybercrime

BitLocker in the crosshairs: stealth attacks via COM hijacking. Online PoC

An innovative tool known as BitlockMove has been introduced, which highlights a novel lateral movement technique. This PoC leverages DCOM...
Redazione RHC - 15 September 2025
From image theft to deepfakes: the new frontier of digital manipulation Cybercrime

From image theft to deepfakes: the new frontier of digital manipulation

In recent months, I've repeatedly found myself filing complaints about fake videos circulating online. We're not just talking about stolen...
Paolo Galdieri - 15 September 2025

Italian Scientists: Federico Faggin, the Italian who invented the microprocessor.

Among the illustrious Italian scientists, creators of cutting-edge technological innovations (we have already talked about Per Giorgio Perotto and Leonardo Chiariglione), Federico Faggin, the Italian who designed the first microprocessor,...
Share on Facebook Share on LinkedIn Share on X

The first message ever sent over the internet

Today exchanging a message via WhatsApp or Skype is a normal gesture, which is part of the activities we carry out in our daily lives. In all history books, it...
Share on Facebook Share on LinkedIn Share on X

Discovering Predatory Sparrow: Identity, Goals, and Digital Arsenal of the Mysterious Threat Actor

On June 17, 2025, a cyber attack paralyzed Bank Sepah, one of Iran's major financial institutions. The attack was claimed by the Predatory Sparrow group, already known for its destructive...
Share on Facebook Share on LinkedIn Share on X

Famous hackers: the sad story of Jonathan James, aka c0mrade.

He was born on December 12, 1983, in a small village called Pinecrest located in Miami-Dade County, Florida. His father was a computer programmer and his mother was a housewife....
Share on Facebook Share on LinkedIn Share on X

Famous Hackers: The Story of Gary McKinnon.

A few months after the attacks on the World Trade Center, a strange message appeared on a U.S. Army computer: "Your security system is shit" it read. "I am Alone....
Share on Facebook Share on LinkedIn Share on X

DuckDuckGo Updates Scam Blocker: Say Goodbye to Online Scams and Fake Sites!

The Scam Blocker tool built into DuckDuckGo browser has been updated to protect against online scams. Now detects fake e-commerce sites, cryptocurrency exchanges, and scareware. DuckDuckGo browser, which is entering public beta...
Share on Facebook Share on LinkedIn Share on X

Cyberattacks on NFC contactless payments increase, new global threat

A new series of cyber attacks has been detected by ESET specialists, which sees the contactless payments sector with NFC technology as the protagonist. This type of attack was initially...
Share on Facebook Share on LinkedIn Share on X

The Race to 0day! China Advances in Offensive Cyberpower, While the US Is Forced to Chase

China's growing rise has prompted U.S. officials to strongly emphasize the need to improve its offensive cyber capabilities. However, some doubts remain about the ability to meet the challenge, given...
Share on Facebook Share on LinkedIn Share on X

Cyberbullying and Digital Terror: Why Betti’s Comic Makes You Feel Uncomfortable (and That’s a Good Thing)

When I decided to write this story of Betti, it was certainly not to make a “nice” or “easy” comic, to read on a sunny afternoon at the beach and...
Share on Facebook Share on LinkedIn Share on X

Miniaturized Military Drone, Mosquito-Sized Model Arrives and China Offers It

In the military sector, the trend to miniaturize drones seems to know no limits, especially when the goal is to operate without being detected. An example of this race to...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
A $500 Tool Claims to Kill EDRs at Kernel Level: Inside the NtKiller Underground Ad
Redazione RHC - 25/12/2025

An ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…

Immagine del sitoCybercrime
Webrat Malware Targets Security Researchers with GitHub Exploit Traps
Redazione RHC - 24/12/2025

There’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…

Immagine del sitoCybercrime
A backdoor in NVIDIA code. Three 9.8 bugs plague AI and robotics development systems
Redazione RHC - 24/12/2025

When it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…

Immagine del sitoCybercrime
La Poste Hit by Pro-Russian DDoS Attack During Peak Holiday Season
Redazione RHC - 23/12/2025

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…

Immagine del sitoVulnerability
CVE-2025-47761: FortiClient VPN Zero-Day Exploit Lets Privilege Escalation
Manuel Roccon - 23/12/2025

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…