Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Ransomfeed 320x100 1
TM RedHotCyber 970x120 042543

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Ransomware attack on European airports leaves Berlin in “emergency mode” Cybercrime

Ransomware attack on European airports leaves Berlin in “emergency mode”

Berlin Airport (BER) remains in "emergency mode" for the fifth day after a major cyberattack on its supply chain. Der...
Redazione RHC - 26 September 2025
Commodore 64: From the Legend of the ’80s to 2025! 10,000 New Consoles Sold Cybercrime

Commodore 64: From the Legend of the ’80s to 2025! 10,000 New Consoles Sold

Commodore Corporation BV was recently acquired by fans and former employees. Now, the new Commodore brand has announced a significant...
Redazione RHC - 26 September 2025
Two critical bugs in Cisco ASA and FTD: score 9.9 and risk of remote code execution Cybercrime

Two critical bugs in Cisco ASA and FTD: score 9.9 and risk of remote code execution

Cisco has disclosed two critical vulnerabilities affecting its Secure Firewall Adaptive Security Appliance (ASA) and Secure Firewall Threat Defense (FTD)...
Redazione RHC - 25 September 2025
Linux dances the samba… but hits a race condition. A critical flaw threatens the kernel. Cybercrime

Linux dances the samba… but hits a race condition. A critical flaw threatens the kernel.

Trend Research researcher Nicholas Zubrisky has reported a critical vulnerability in the ksmbd component of the Linux kernel that allows...
Redazione RHC - 25 September 2025
They slept on networks for 393 days! Chinese state hackers and the BRICKSTORM backdoor Cybercrime

They slept on networks for 393 days! Chinese state hackers and the BRICKSTORM backdoor

According to Google Threat Intelligence , the China-linked espionage group UNC5221 has carried out a series of successful intrusions into...
Redazione RHC - 25 September 2025
Code as we knew it is dead! Artificial Intelligence writes the future. Cybercrime

Code as we knew it is dead! Artificial Intelligence writes the future.

Since 2013, the IEEE has published an annual interactive ranking of the most popular programming languages . However, traditional methods...
Redazione RHC - 25 September 2025

Sophos fixes vulnerabilities in Intercept X for Windows

Sophos announced that it has resolved three separate security vulnerabilities in Sophos Intercept X for Windows and its installer. These vulnerabilities, designated CVE-2024-13972, CVE-2025-7433, and CVE-2025-7472, have been rated High...
Share on Facebook Share on LinkedIn Share on X

Three score 10 bugs have been detected in Cisco ISE and ISE-PIC: urgent updates required.

Several vulnerabilities have been identified in the Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) products that could allow a remote attacker to execute arbitrary commands...
Share on Facebook Share on LinkedIn Share on X

OMGCable: The Thin Red Line Between Penetration Testing and Covert Surveillance

In 2021, during one of my explorations into the increasingly blurred boundary between hardware and cybersecurity, I wrote an article with a title that today sounds almost prophetic: “Even a...
Share on Facebook Share on LinkedIn Share on X

Live Ransomware Attack Video! HackerHood’s Workshop for Omnia and WithSecure

HackerHood, Red Hot Cyber's team of ethical hackers, has created something rarely seen outside of the most exclusive conferences: a live workshop demonstrating, step by step, a complete ransomware attack....
Share on Facebook Share on LinkedIn Share on X

Google Chrome emergency fix for critical bug that leads to sandbox escape

Google has released an emergency update for the Chrome browser, simultaneously eliminating six vulnerabilities, one of which is already actively exploited in real-world attacks. The issue affects critical components associated...
Share on Facebook Share on LinkedIn Share on X

Inside Operation Eastwood: The Shadows of Cyberterrorism and Propaganda

The international "Eastwood" operation represents a watershed moment in the fight against cyberterrorism. For the first time, a coordinated global operation has dealt a severe blow to one of the...
Share on Facebook Share on LinkedIn Share on X

More and more malware is hiding in DNS records. The new frontier is also for AI.

Hackers have learned to hide malware in places where it is virtually impossible to trace: in DNS records that connect domain names to IP addresses. This technique allows them to...
Share on Facebook Share on LinkedIn Share on X

The Computer Science degree is changing! 18 months to rewrite your resume.

With the unstoppable advance of artificial intelligence in the education system, American colleges and universities are profoundly rethinking computer science courses. The goal? To promote not only AI literacy, but...
Share on Facebook Share on LinkedIn Share on X

The new version of the Konfety malware uses advanced evasion techniques

A new version of the Android malware called Konfety has become even more sophisticated: specialists at Zimperium zLabs have discovered an improved variant that uses non-standard ZIP archives and loads...
Share on Facebook Share on LinkedIn Share on X

Xlibre and Wayback: Two Linux Projects Clash Over X.org’s Legacy

The Linux ecosystem is once again in the spotlight, with a fork of the good old X.org taking center stage. The new project, called Xlibre, was launched by German developer...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Larva-25012 Proxyjacking Campaign Targets South Korea with Notepad++ Malware
Redazione RHC - 22/01/2026

A sophisticated proxyjacking campaign is targeting systems in South Korea, attributed to the actor Larva-25012 , which distributes proxyware disguised as legitimate Notepad++ installers. The campaign demonstrates significant technical evolution, using process injection in explorer.exe…

Immagine del sitoCybercrime
PurpleBravo’s Contagious Interview: Malware Campaign Targets Global Firms
Redazione RHC - 22/01/2026

For over a year, the North Korean group PurpleBravo has been running a targeted malware campaign called “Contagious Interview,” using fake job interviews to attack companies in Europe, Asia, the Middle East, and Central America.…

Immagine del sitoCybercrime
KONNI Malware Targets Crypto Developers with AI-Powered Attacks
Redazione RHC - 22/01/2026

Check Point Research recently discovered a sophisticated phishing campaign orchestrated by KONNI , a threat group linked to North Korea . Historically focused on diplomatic targets in South Korea, the malicious actor has now expanded…

Immagine del sitoCybercrime
Fortinet FortiOS Vulnerability Exploited: CVE-2025-59718 Patch Bypass
Redazione RHC - 22/01/2026

Attackers are exploiting a previously patched critical FortiGate authentication flaw (CVE-2025-59718) through a patch bypass method to breach protected firewalls, as Fortinet customers are experiencing. Fortinet reportedly plans to soon release FortiOS versions 7.4.11, 7.6.6,…

Immagine del sitoCybercrime
Cisco Zero-Day Vulnerability CVE-2026-20045 Actively Exploited
Redazione RHC - 22/01/2026

A critical zero-day remote code execution (RCE) vulnerability, identified as CVE-2026-20045, has been discovered by Cisco and is being actively exploited in active attacks. Cisco has urged immediate patching, and its Product Security Incident Response…