Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
UtiliaCS 320x100
HackTheBox 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Google Chrome Zero-Day Vulnerability: CISA Warns and Files Bug on KEV Cybercrime

Google Chrome Zero-Day Vulnerability: CISA Warns and Files Bug on KEV

The United States has received an alert from the Cybersecurity and Infrastructure Security Agency (CISA) regarding a highly critical zero-day...
Redazione RHC - 24 September 2025
Violent social media and video games: the new ticking time bomb for teens. Cybercrime

Violent social media and video games: the new ticking time bomb for teens.

The uncontrolled use of social media and violent video games poses a growing threat to adolescents at a crucial stage...
Redazione RHC - 24 September 2025
WhatsApp introduces in-app message translation Cybercrime

WhatsApp introduces in-app message translation

WhatsApp has announced a new feature that allows for in-app message translation . The company emphasizes that language barriers often...
Redazione RHC - 24 September 2025
TikTok, the app setting the US ablaze: billion-dollar deal for total control Cybercrime

TikTok, the app setting the US ablaze: billion-dollar deal for total control

TikTok's fate in the United States is now inextricably linked to political negotiations. The White House has announced that the...
Redazione RHC - 24 September 2025
Supply Chain: The blockade of European airports raises concerns about an increasingly critical issue. Cybercrime

Supply Chain: The blockade of European airports raises concerns about an increasingly critical issue.

On September 20, 2025, a cyberattack hit three of Europe's major airports: London Heathrow, Brussels, and Berlin. The digital systems...
Paolo Galdieri - 24 September 2025
Dedigitalization: Japanese city of Toyoda restricts smartphone use Cybercrime

Dedigitalization: Japanese city of Toyoda restricts smartphone use

In the Japanese city of Toyoda (Aichi Prefecture), city council members approved a draft ordinance limiting smartphone use during leisure...
Redazione RHC - 24 September 2025

Tasting the Exploit: HackerHood testa l’exploit su Wing FTP Server del CVE‑2025‑47812 da Score 10

This tool is intended solely for authorized educational and penetration testing purposes. The author assumes no responsibility for any misuse or damage caused by this software. Always ensure you have...
Share on Facebook Share on LinkedIn Share on X

Cloudflare Down: DNS 1.1.1.1 went down, causing widespread global outage

Cloudflare has reported temporary issues with its public DNS resolver 1.1.1.1, reported by users around the world. The incident reportedly began on the evening of July 14, 2025, around 10:13...
Share on Facebook Share on LinkedIn Share on X

Gravity Forms Under Attack: WordPress Plugin Infected with a Backdoor

The popular WordPress Gravity Forms plugin has suffered a supply chain attack, infecting its official website with a backdoor. Gravity Forms is a premium plugin for creating contact forms, payment...
Share on Facebook Share on LinkedIn Share on X

GPUHammer: Hardware attacks on NVIDIA GPUs lead to compromised AI models

NVIDIA has reported a new vulnerability in its graphics processors, called GPUHammer. This attack, based on the well-known RowHammer technique, allows attackers to corrupt other users' data by exploiting the...
Share on Facebook Share on LinkedIn Share on X

Grok 3: “Adolf Hitler is a German benefactor!” The risk of persistent memory and misinformation

With the emergence of Large Language Models (LLMs), such as Grok 3, GPT-4, Claude, and Gemini, the scientific community's focus has shifted from the mere accuracy of responses to their...
Share on Facebook Share on LinkedIn Share on X

Discovering LLM Firewalls: The New Frontier in Adaptive Cyber Security

Over the past 3 years, generative AI, particularly large language models (LLMs), have revolutionized the way we interact with machines, allowing us to obtain increasingly natural and contextualized responses. However,...
Share on Facebook Share on LinkedIn Share on X

The biggest threat from AI? Young people won’t be able to think anymore!

"Now that the genie is out of the bottle, it's impossible to put it back!". How many times have we written these words about artificial intelligence? Now that the genie...
Share on Facebook Share on LinkedIn Share on X

What is phishing? Let’s avoid falling for the hack-fisherman’s bait.

With the increase in ransomware attacks—often launched via phishing emails—it's crucial to be proactive in protecting yourself and the organization you work for. Certainly, having computers and servers that are...
Share on Facebook Share on LinkedIn Share on X

What are supply chain attacks? A more concrete threat than ever.

As businesses become increasingly dependent on technology, connectivity, and third parties in general, supply chain attacks are becoming increasingly common. These attacks are aimed at compromising companies through their suppliers...
Share on Facebook Share on LinkedIn Share on X

I use macOS because it’s secure! Atomic Stealer: €1,000 per month with backdoor features

Researchers have discovered a new version of the Atomic Stealer malware for macOS (also known as AMOS). The malware now has a backdoor that allows access to hacked systems. MacPaw...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Larva-25012 Proxyjacking Campaign Targets South Korea with Notepad++ Malware
Redazione RHC - 22/01/2026

A sophisticated proxyjacking campaign is targeting systems in South Korea, attributed to the actor Larva-25012 , which distributes proxyware disguised as legitimate Notepad++ installers. The campaign demonstrates significant technical evolution, using process injection in explorer.exe…

Immagine del sitoCybercrime
PurpleBravo’s Contagious Interview: Malware Campaign Targets Global Firms
Redazione RHC - 22/01/2026

For over a year, the North Korean group PurpleBravo has been running a targeted malware campaign called “Contagious Interview,” using fake job interviews to attack companies in Europe, Asia, the Middle East, and Central America.…

Immagine del sitoCybercrime
KONNI Malware Targets Crypto Developers with AI-Powered Attacks
Redazione RHC - 22/01/2026

Check Point Research recently discovered a sophisticated phishing campaign orchestrated by KONNI , a threat group linked to North Korea . Historically focused on diplomatic targets in South Korea, the malicious actor has now expanded…

Immagine del sitoCybercrime
Fortinet FortiOS Vulnerability Exploited: CVE-2025-59718 Patch Bypass
Redazione RHC - 22/01/2026

Attackers are exploiting a previously patched critical FortiGate authentication flaw (CVE-2025-59718) through a patch bypass method to breach protected firewalls, as Fortinet customers are experiencing. Fortinet reportedly plans to soon release FortiOS versions 7.4.11, 7.6.6,…

Immagine del sitoCybercrime
Cisco Zero-Day Vulnerability CVE-2026-20045 Actively Exploited
Redazione RHC - 22/01/2026

A critical zero-day remote code execution (RCE) vulnerability, identified as CVE-2026-20045, has been discovered by Cisco and is being actively exploited in active attacks. Cisco has urged immediate patching, and its Product Security Incident Response…