Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Fortinet 320x100px
UtiliaCS 970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Italy among the spyware giants! A solid third place after Israel and the US. Cybercrime

Italy among the spyware giants! A solid third place after Israel and the US.

We're not exactly great at cybersecurity, but we're top of the class when it comes to spyware! According to an...
Redazione RHC - 12 September 2025
Windows 11: Microsoft Revamps File Explorer with Artificial Intelligence Cybercrime

Windows 11: Microsoft Revamps File Explorer with Artificial Intelligence

Microsoft has begun testing new AI-powered features in File Explorer in Windows 11. These features will allow users to interact...
Redazione RHC - 12 September 2025
CISA launches new plan to improve CVE quality and global cyber defense Cybercrime

CISA launches new plan to improve CVE quality and global cyber defense

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has presented the document "CISA Strategic Focus CVE Quality for a Cyber...
Redazione RHC - 12 September 2025
Microsoft Teams raises its defenses: real-time alerts against malicious links Cybercrime

Microsoft Teams raises its defenses: real-time alerts against malicious links

To strengthen the security of its Teams platform, Microsoft will implement an automatic notification system to users regarding dangerous links...
Redazione RHC - 12 September 2025
Goodbye PowerShell 2.0 and WMIC! The great Windows 11 cleanup has begun. Cybercrime

Goodbye PowerShell 2.0 and WMIC! The great Windows 11 cleanup has begun.

Windows 11 users who have installed the September 2025 Update might think that practically nothing changes. At first glance, KB5065426...
Redazione RHC - 12 September 2025
At the Spinoza Campus in Amsterdam, 1,200 students were held hostage by washing machines. Cybercrime

At the Spinoza Campus in Amsterdam, 1,200 students were held hostage by washing machines.

An unusual incident occurred at the Spinoza Campus in Amsterdam: an unknown attacker hacked the digital payment system of five...
Redazione RHC - 12 September 2025

Myth: If I use a VPN, I am completely safe even on open and unsecured WiFi networks

Many believe that using a VPN guarantees total protection while browsing, even on completely open and unsafe WiFi networks. Although VPNs are effective tools for encrypting traffic and preventing data...
Share on Facebook Share on LinkedIn Share on X

Your VPN is a Trojan! Here are 17 Free Apps Made in China That Spy on You While Google and Apple Get Fat

"If you don't pay for the service, you are the product. This is true for social networks, but also for free VPNs: your data, your privacy, is often the real...
Share on Facebook Share on LinkedIn Share on X
sicari a pagamento

Murders Like a Drink! Dark Web Recruits Kids With Encrypted Apps in Europe

A worrying criminal trend is taking hold in Europe: criminal gangs are using encrypted apps to recruit teenagers as young as 14 to commit violent crimes, including contract killings. These...
Share on Facebook Share on LinkedIn Share on X
Fumetto sul cyberbullismo di Red Hot Cyber

“Byte The Silence”: RHC’s Free Shock Comic About Cyberbullying Out Today!

Today, June 23, 2025, "Byte The Silence" is released, the new comic about cyberbullying created by Red Hot Cyber, is available from today for free in electronic format, on our...
Share on Facebook Share on LinkedIn Share on X

FortiGate Under Attack: Tools for Mass Exploitation of Exposed APIs for Sale

A new and alarming development is shaking up the cybersecurity landscape: a malicious actor has advertised on the dark web a highly sophisticated exploit aimed at compromising FortiGate devices. A...
Share on Facebook Share on LinkedIn Share on X

Breadcrumbing: Understanding Emotional Manipulation to Better Defend Yourself in the Digital Domain

This article aims to explore the phenomenon of breadcrumbing from a psychological perspective, metaphorically linking it to the insidious strategies that attackers use in cybersecurity. We will discover how understanding...
Share on Facebook Share on LinkedIn Share on X

Connected and Vulnerable: How to Secure OT and ICS in 2025

In today's interconnected world, cybersecurity is not just about protecting information. Today, most devices and physical tools are connected to the network in some way. Whether for its structural operation...
Share on Facebook Share on LinkedIn Share on X

Darkcloux 3.0 is here: Securonis Linux becomes more secure (and more extreme) than ever

Securonis Linux has released its most significant update: version 3.0 of "Darkcloux" and the 3.0-r1 patch. The release includes new utilities, redesigned components, and improvements to privacy and security. The main change...
Share on Facebook Share on LinkedIn Share on X

Urobot watches you while you pee (but it’s for your own good)

A Taiwanese hospital is testing Urobot, a smart urinal that instantly analyzes urine and emails the results. Although the device is designed in a "cute" style, social media users have...
Share on Facebook Share on LinkedIn Share on X

Smart TV or Living Room Spies? Here’s How They’re Monitoring You

Many owners of smart TV operating systems are increasingly finding themselves caught in a conflict that rages between the desire to preserve viewer privacy and pressure from the advertising industry....
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Villager Framework: AI-Powered Penetration Testing Tool
Redazione RHC - 26/12/2025

Straiker’s AI Research (STAR) team has identified Villager, a native AI-based penetration testing framework developed by the Chinese group Cyberspike . The tool, presented as a red team solution , is designed to fully automate…

Immagine del sitoCybercrime
A $500 Tool Claims to Kill EDRs at Kernel Level: Inside the NtKiller Underground Ad
Redazione RHC - 25/12/2025

An ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…

Immagine del sitoCybercrime
Webrat Malware Targets Security Researchers with GitHub Exploit Traps
Redazione RHC - 24/12/2025

There’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…

Immagine del sitoCybercrime
A backdoor in NVIDIA code. Three 9.8 bugs plague AI and robotics development systems
Redazione RHC - 24/12/2025

When it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…

Immagine del sitoCybercrime
La Poste Hit by Pro-Russian DDoS Attack During Peak Holiday Season
Redazione RHC - 23/12/2025

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…