Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
UtiliaCS 320x100
Banner Ancharia Desktop 1 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Cryptocurrencies, ransomware, and hamburgers: the fatal combo for Scattered Spider Cybercrime

Cryptocurrencies, ransomware, and hamburgers: the fatal combo for Scattered Spider

The U.S. Department of Justice and British police have charged Talha Jubair, 19, a resident of East London, who investigators...
Redazione RHC - 25 September 2025
Blade Runner Already Predicted Deepfake! Cyber Lessons from Film Classics Cybercrime

Blade Runner Already Predicted Deepfake! Cyber Lessons from Film Classics

“ Art is a mirror that reflects the soul of the beholder.” This quote, which captures the essence of our...
Daniela Farina - 25 September 2025
The freebie party is over! Open source infrastructure is at risk and needs funding. Cybercrime

The freebie party is over! Open source infrastructure is at risk and needs funding.

An open letter signed by major open source foundations has raised the alarm about the future of the infrastructure that...
Redazione RHC - 25 September 2025
Zero-Day Vulnerabilities Found in Cisco IOS and IOS XE: Urgent Updates Cybercrime

Zero-Day Vulnerabilities Found in Cisco IOS and IOS XE: Urgent Updates

Cisco has disclosed a zero-day vulnerability, tracked as CVE-2025-20352, in its widely used IOS and IOS XE software; this vulnerability...
Redazione RHC - 25 September 2025
Artificial Intelligence: A Double-Edged Sword in Digital Security Cybercrime

Artificial Intelligence: A Double-Edged Sword in Digital Security

Artificial intelligence is increasingly being described as a double-edged sword, capable of offering enormous advantages but also opening new avenues...
Redazione RHC - 25 September 2025
Kali Linux 2025.3 is out! A new release with improvements and new tools. Cybercrime

Kali Linux 2025.3 is out! A new release with improvements and new tools.

Kali Linux developers have released a new release, 2025.3 , which expands the distribution's functionality and adds ten new penetration...
Redazione RHC - 24 September 2025

A study shows a shocking truth: 98.5% of passwords are weak!

In a new analysis based on 10 million compromised passwords, Specops has demonstrated how vulnerable corporate networks remain to human error. All passwords were extracted from a list of over...
Share on Facebook Share on LinkedIn Share on X

Operation Eastwood: Pro-Russian hacker group NoName057(16) dismantled

As part of the investigations conducted by the Rome Public Prosecutor's Office and coordinated by the National Anti-Mafia and Anti-Terrorism Directorate, the Postal Police has completed important investigative activities in...
Share on Facebook Share on LinkedIn Share on X

What is Doxing and How Can It Change Your Online Life?

Doxing (short for "dropping dox," sometimes written as Doxxing) is the act of revealing personal information about someone online, such as their real name, home address, workplace, phone number, financial...
Share on Facebook Share on LinkedIn Share on X

What are Botnets? A Journey Through Malware, Cyber Threat Intelligence, and OSINT

The Internet provides a sea of information. We often talk on RHC about Open Source Intelligence (OSINT) and Cyber Threat Intelligence (CTI), i.e. those intelligence disciplines that deal with the...
Share on Facebook Share on LinkedIn Share on X

Cloudflare: DDoS attacks decline in Q2 2025, but extreme attacks increase

Cloudflare recorded a sharp decline in DDoS attacks in the second quarter of 2025, blocking 7.3 million attacks, compared to the 20.5 million reported in the first quarter. Despite the...
Share on Facebook Share on LinkedIn Share on X
Misteriosi APT nell'ombra digitale: Un'immersione profonda nelle minacce cibernetiche altamente sofisticate. Scopri chi sono, cosa li muove e come proteggerti in questo viaggio attraverso il mondo delle Advanced Persistent Threat (APT)

What is an Advanced Persistent Threat (APT). A journey through malicious actors and state-sponsored hackers.

Advanced Persistent Threats (APTs) are malicious actors that operate in the shadows of the internet, conducting highly sophisticated and targeted attacks. These groups, often associated with nation-states, pose a significant...
Share on Facebook Share on LinkedIn Share on X

What are Distributed Denial of Service (DDoS) attacks and how can we protect ourselves from them?

Distributed Denial of Service (DDoS) attacks are one of the most common threats to websites, servers, and other online infrastructure. Specifically, this type of attack attempts to overwhelm target servers...
Share on Facebook Share on LinkedIn Share on X

The Inconvenient Truth About Work and AI: 99% Fight, 1% Win

On July 11, local time, it was revealed that Google DeepMind had successfully "recruited" the core team of AI startup Windsurf. Not long before, OpenAI was negotiating a $3 billion...
Share on Facebook Share on LinkedIn Share on X

Hackers use ClickFix and FileFix to spread the Interlock Trojan

The Interlock ransomware hacker group is distributing a remote access trojan (RAT) through compromised websites. Hackers use FileFix attacks to spread the malware. ClickFix attacks rely on social engineering. Several...
Share on Facebook Share on LinkedIn Share on X

Discovering Scattered Spider: The Criminal Threat Using Advanced Tactics and Techniques

By Cyber Defense Center Maticmind (Andrea Mariucci, Riccardo Michetti, Federico Savastano, Ada Spinelli) The Scattered Spider threat actor, UNC9344, made its appearance in 2022 with two targeted attacks on Caesars...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Larva-25012 Proxyjacking Campaign Targets South Korea with Notepad++ Malware
Redazione RHC - 22/01/2026

A sophisticated proxyjacking campaign is targeting systems in South Korea, attributed to the actor Larva-25012 , which distributes proxyware disguised as legitimate Notepad++ installers. The campaign demonstrates significant technical evolution, using process injection in explorer.exe…

Immagine del sitoCybercrime
PurpleBravo’s Contagious Interview: Malware Campaign Targets Global Firms
Redazione RHC - 22/01/2026

For over a year, the North Korean group PurpleBravo has been running a targeted malware campaign called “Contagious Interview,” using fake job interviews to attack companies in Europe, Asia, the Middle East, and Central America.…

Immagine del sitoCybercrime
KONNI Malware Targets Crypto Developers with AI-Powered Attacks
Redazione RHC - 22/01/2026

Check Point Research recently discovered a sophisticated phishing campaign orchestrated by KONNI , a threat group linked to North Korea . Historically focused on diplomatic targets in South Korea, the malicious actor has now expanded…

Immagine del sitoCybercrime
Fortinet FortiOS Vulnerability Exploited: CVE-2025-59718 Patch Bypass
Redazione RHC - 22/01/2026

Attackers are exploiting a previously patched critical FortiGate authentication flaw (CVE-2025-59718) through a patch bypass method to breach protected firewalls, as Fortinet customers are experiencing. Fortinet reportedly plans to soon release FortiOS versions 7.4.11, 7.6.6,…

Immagine del sitoCybercrime
Cisco Zero-Day Vulnerability CVE-2026-20045 Actively Exploited
Redazione RHC - 22/01/2026

A critical zero-day remote code execution (RCE) vulnerability, identified as CVE-2026-20045, has been discovered by Cisco and is being actively exploited in active attacks. Cisco has urged immediate patching, and its Product Security Incident Response…