Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
2nd Edition GlitchZone RHC 320x100 2
Fortinet 970x120px

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Linux in Crisis: Rust Splits Community and Maintainers Leave Cybercrime

Linux in Crisis: Rust Splits Community and Maintainers Leave

The Linux world and its surroundings are going through turbulent times. Developers are debating how to integrate Rust into the...
Redazione RHC - 14 September 2025
Happy Birthday, Super Mario Bros.! 40 years of a game that revolutionized the world. Cybercrime

Happy Birthday, Super Mario Bros.! 40 years of a game that revolutionized the world.

It's been exactly four decades since the release of the legendary Super Mario Bros., a project that changed the video...
Redazione RHC - 14 September 2025
China Makes Historic Turn: Mandatory Labeling of AI-Created Content Cybercrime

China Makes Historic Turn: Mandatory Labeling of AI-Created Content

A series of Chinese national standards came into force on September 1st, aimed at redefining rules, responsibilities, and controls in...
Redazione RHC - 14 September 2025
Satellite SIEM: US Defense Develops AI to Defend Satellites from Hackers Cybercrime

Satellite SIEM: US Defense Develops AI to Defend Satellites from Hackers

U.S. defense contractors are developing an artificial intelligence tool called Cyber Resilience On-Orbit (CROO) to detect cyber attacks on satellites...
Redazione RHC - 13 September 2025
OpenAI and Microsoft reach agreement to transform into a public utility company. Cybercrime

OpenAI and Microsoft reach agreement to transform into a public utility company.

OpenAI has entered into a memorandum of understanding with Microsoft to review its partnership, which could lead to the company's...
Redazione RHC - 13 September 2025
Nebius, formerly Yandex, signs billion-dollar AI deal with Microsoft Cybercrime

Nebius, formerly Yandex, signs billion-dollar AI deal with Microsoft

Nebius (formerly Yandex) has announced a major agreement with Microsoft Corporation to lease graphics processing units (GPUs) for artificial intelligence....
Redazione RHC - 13 September 2025

Critical Vulnerabilities Discovered in Hundreds of Brother and Other Printers

Hundreds of printer models from Brother and other manufacturers (Fujifilm, Toshiba, Ricoh and Konica Minolta) have been found to be vulnerable to serious vulnerabilities discovered by researchers at Rapid7. For...
Share on Facebook Share on LinkedIn Share on X

Pope warns: “AI is not the devil, but it can become one without ethics”

The head of the Catholic Churchhas expressed concern about the way today's children and adolescents interact with digital technologies. In his viewthe abundance of information available through neural networks and...
Share on Facebook Share on LinkedIn Share on X

Microsoft 365 Under Attack: How Hackers Use Direct Send to Send Phishing Emails

A sophisticated phishing campaign that targeted over 70 organizations by exploiting Microsoft 365's Direct Send feature. The campaign, which began in May 2025 and has shown steady activity over the...
Share on Facebook Share on LinkedIn Share on X

Warning! WinRAR: Critical Vulnerability That Could Run Malware

WinRAR developers have fixed a Directory Traversal vulnerability, which has been assigned the identifier CVE-2025-6218. Under certain circumstances, this bug allowed malware to be executed after the archive was extracted....
Share on Facebook Share on LinkedIn Share on X

He died because of ransomware! Another victim joins the list

This is not the first time that a cyber attack has resulted in the loss of human lives.We had already discussed it in the article "I deferichò per il ransomware....
Share on Facebook Share on LinkedIn Share on X

A new fileless infostealer is being spread by Telegram and legitimate services

TLP: AMBERAnalyst: Agostino Pellegrino, Crescenzo Cuoppolo, Alessio BandiniLast revision date: 2025-06-24 This forensic technical report documents the complete analysis of a multi-stage infostealer delivered via a Python fileless loader, identified...
Share on Facebook Share on LinkedIn Share on X

Citrix: New Critical Vulnerability from 9.2 Affects NetScaler – Attacks Underway!

Citrix has reported a new critical vulnerability in its NetScaler appliances, already actively exploited by attackers. The problem is identified with the identifier CVE-2025-6543 and affects the popular NetScaler ADC...
Share on Facebook Share on LinkedIn Share on X

Fox Kitten and Br0k3r: The Iranian Cyber Contractor Collaborating with Ransomware Gangs

We continue our series of articles on IABs by writing about an Iranian cyber contractor that not only works as an initial access broker but also provides support to ransomware...
Share on Facebook Share on LinkedIn Share on X

REvil: Sentenced but then set free. The most controversial court case ever

Do you remember the infamous REvil cyber gang? The Russian hacker group responsible for some of the most devastating ransomware attacks in the early days of this global threat, known...
Share on Facebook Share on LinkedIn Share on X

Shock in France: the gentlemen of BreachForums were twenty-year-old French citizens!

Shocking news in France: one of the largest global cybercrime networks dismantled. The BreachForum hackers were… French. French authorities have busted a large cybercrime operation, arresting five young French hackers...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Villager Framework: AI-Powered Penetration Testing Tool
Redazione RHC - 26/12/2025

Straiker’s AI Research (STAR) team has identified Villager, a native AI-based penetration testing framework developed by the Chinese group Cyberspike . The tool, presented as a red team solution , is designed to fully automate…

Immagine del sitoCybercrime
A $500 Tool Claims to Kill EDRs at Kernel Level: Inside the NtKiller Underground Ad
Redazione RHC - 25/12/2025

An ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…

Immagine del sitoCybercrime
Webrat Malware Targets Security Researchers with GitHub Exploit Traps
Redazione RHC - 24/12/2025

There’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…

Immagine del sitoCybercrime
A backdoor in NVIDIA code. Three 9.8 bugs plague AI and robotics development systems
Redazione RHC - 24/12/2025

When it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…

Immagine del sitoCybercrime
La Poste Hit by Pro-Russian DDoS Attack During Peak Holiday Season
Redazione RHC - 23/12/2025

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…