Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
UtiliaCS 320x100
2nd Edition GlitchZone RHC 970x120 2

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Goodbye, Windows 10! Microsoft warns that updates will end on October 14th. Cybercrime

Goodbye, Windows 10! Microsoft warns that updates will end on October 14th.

Microsoft reminded users that support for the beloved Windows 10 will end in a month. Starting October 14, 2025, the...
Redazione RHC - 15 September 2025
BitLocker in the crosshairs: stealth attacks via COM hijacking. Online PoC Cybercrime

BitLocker in the crosshairs: stealth attacks via COM hijacking. Online PoC

An innovative tool known as BitlockMove has been introduced, which highlights a novel lateral movement technique. This PoC leverages DCOM...
Redazione RHC - 15 September 2025
From image theft to deepfakes: the new frontier of digital manipulation Cybercrime

From image theft to deepfakes: the new frontier of digital manipulation

In recent months, I've repeatedly found myself filing complaints about fake videos circulating online. We're not just talking about stolen...
Paolo Galdieri - 15 September 2025
The ChillyHell backdoor returns to threaten macOS systems. Cybercrime

The ChillyHell backdoor returns to threaten macOS systems.

Researchers have reported a new surge in activity for ChillyHell, a modular backdoor for macOS that was thought to be...
Redazione RHC - 15 September 2025
Regulating out-of-office work: a best practice for organizations and beyond. Culture

Regulating out-of-office work: a best practice for organizations and beyond.

When talking about information security, we must first take a breath and realize that we need to dive deeper than...
Stefano Gazzella - 15 September 2025
Apple introduces Memory Integrity Enforcement. Will this be the end of hacking? Cybercrime

Apple introduces Memory Integrity Enforcement. Will this be the end of hacking?

Apple officially introduced Memory Integrity Enforcement, a new memory protection system that the company calls the most significant advancement ever...
Redazione RHC - 15 September 2025

The Race to 0day! China Advances in Offensive Cyberpower, While the US Is Forced to Chase

China's growing rise has prompted U.S. officials to strongly emphasize the need to improve its offensive cyber capabilities. However, some doubts remain about the ability to meet the challenge, given...
Share on Facebook Share on LinkedIn Share on X

Cyberbullying and Digital Terror: Why Betti’s Comic Makes You Feel Uncomfortable (and That’s a Good Thing)

When I decided to write this story of Betti, it was certainly not to make a “nice” or “easy” comic, to read on a sunny afternoon at the beach and...
Share on Facebook Share on LinkedIn Share on X

Miniaturized Military Drone, Mosquito-Sized Model Arrives and China Offers It

In the military sector, the trend to miniaturize drones seems to know no limits, especially when the goal is to operate without being detected. An example of this race to...
Share on Facebook Share on LinkedIn Share on X

Cybersecurity, Italy on the podium with four young people. There is also Leonardo already protagonist in the RHC CTF

The first edition of the International Cybersecurity Olympiad ended in Singapore with an excellent result for Italy. Four Italian students reached the podium, winning gold and silver medals in the...
Share on Facebook Share on LinkedIn Share on X

Cyber Security: CISA and NSA Recommend Secure Programming Languages

The main US cybersecurity agencies, CISA and NSA, have published a joint document recommending that software developers opt for programming languages considered "memory safe". These languages are designed to provide...
Share on Facebook Share on LinkedIn Share on X

Apple and Google under pressure: German regulator wants to remove DeepSeek

Following the Italian data protection regulator, Germany's data protection watchdog has now asked Apple and Alphabet subsidiary Google to remove the Chinese artificial intelligence (AI) startup's DeepSeek app from their...
Share on Facebook Share on LinkedIn Share on X

A former Australian university student has been accused of hacking Western Sydney University

New South Wales police have arrested a 27-year-old former Western Sydney University student who had repeatedly hacked into the university's systems, including to obtain cheaper parking. Western Sydney University is...
Share on Facebook Share on LinkedIn Share on X

Cyber War: The Invisible War in Cyberspace That Decides the Conflicts of the Present

In the heart of contemporary conflicts, alongside tanks, drones and troops, an invisible, silent and often underestimated war is being fought: cyber war. It is not just a futuristic scenario...
Share on Facebook Share on LinkedIn Share on X

Skynet is coming: the malware that attacks Artificial Intelligence!

An unusual example of malicious code has been discovered in a real computing environment, which for the first time recorded an attempt to attack not classical defense mechanisms, but directly...
Share on Facebook Share on LinkedIn Share on X

Cybersecurity, from NIS2 to the Cyber Resilience Act: Fortinet guides companies in compliance with the new regulatory landscape

By Aldo Di Mattia, Director of Specialized Systems Engineering and Cybersecurity Advisor Italy and Malta at Fortinet After years of defining new regulatory strategies, the regulatory landscape, particularly in Europe,...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Villager Framework: AI-Powered Penetration Testing Tool
Redazione RHC - 26/12/2025

Straiker’s AI Research (STAR) team has identified Villager, a native AI-based penetration testing framework developed by the Chinese group Cyberspike . The tool, presented as a red team solution , is designed to fully automate…

Immagine del sitoCybercrime
A $500 Tool Claims to Kill EDRs at Kernel Level: Inside the NtKiller Underground Ad
Redazione RHC - 25/12/2025

An ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…

Immagine del sitoCybercrime
Webrat Malware Targets Security Researchers with GitHub Exploit Traps
Redazione RHC - 24/12/2025

There’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…

Immagine del sitoCybercrime
A backdoor in NVIDIA code. Three 9.8 bugs plague AI and robotics development systems
Redazione RHC - 24/12/2025

When it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…

Immagine del sitoCybercrime
La Poste Hit by Pro-Russian DDoS Attack During Peak Holiday Season
Redazione RHC - 23/12/2025

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…