Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Cyber Offensive Fundamentals 320x200 V0.1
970x20 Itcentric

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

$50 Deepfakes: The New Darknet Business Concerns Cybersecurity Cybercrime

$50 Deepfakes: The New Darknet Business Concerns Cybersecurity

Kaspersky Lab researchers have discovered advertisements on the darknet offering the ability to create video and audio deepfakes in real...
Redazione RHC - 23 September 2025
ClickFix: The Scam That Tricks Mac Users into Installing the AMOS Trojan Cybercrime

ClickFix: The Scam That Tricks Mac Users into Installing the AMOS Trojan

Cybercriminals have launched a large-scale campaign against macOS users, disguising malware as popular programs. LastPass reported this, having discovered that...
Redazione RHC - 23 September 2025
EDR-Freeze Arrives! It Puts Windows into a Deep Coma Without Vulnerable Drivers Cybercrime

EDR-Freeze Arrives! It Puts Windows into a Deep Coma Without Vulnerable Drivers

A Zero Salarium specialist has presented a method that temporarily disables antivirus processes and EDR agents on Windows using built-in...
Redazione RHC - 23 September 2025
The DDoS King is here! 40 seconds at 22.2 terabits mitigated by Cloudflare Cybercrime

The DDoS King is here! 40 seconds at 22.2 terabits mitigated by Cloudflare

Cloudflare has announced that it independently managed an unprecedented Distributed Denial-of-Service (DDoS) attack, the largest ever seen. The hypervolumetric attack...
Redazione RHC - 23 September 2025
The Warlock Group: A New Player in the Ransomware Market Cybercrime

The Warlock Group: A New Player in the Ransomware Market

The Warlock group, also known as Storm-2603 and GOLD SALEM , has gone from being a newcomer to a major...
Redazione RHC - 23 September 2025
Cyberwar in Italy: The government brings the army into cyberspace. Culture

Cyberwar in Italy: The government brings the army into cyberspace.

Cyberspace is no longer a marginal dimension but a true strategic operational domain. Its relevance is now comparable to that...
Paolo Galdieri - 23 September 2025

AI stymied by energy constraints, innovative space solutions needed

During an interview on the Manifold podcast, Omar Shams, head of the Google Agents project, emphasized that besides chips, the other major limitation to AI development is energy. It's often...
Share on Facebook Share on LinkedIn Share on X

Donald Trump admits the US is hacking China: “That’s the way of the world.”

President Donald Trump briefly left Maria Bartiromo speechless during an interview when he insinuated that the United States was hacking Chinese systems. The president highlighted the "large trade deficit with...
Share on Facebook Share on LinkedIn Share on X

TapTrap Attack: How to Get Yourself to Click Things Even Your Mom Wouldn’t Approve of

TapTrap exploits user interface animations to bypass Android's permissions system, allowing it to access sensitive data or trick the user into performing destructive actions, such as factory resetting the device....
Share on Facebook Share on LinkedIn Share on X

AI will end the traditional software industry just as the Internet has changed traditional media.

Generative AI, including tools like Cursor and ClaudeCode, are dramatically reducing the cost and time of software development. What once cost hundreds or thousands of dollars per token can now...
Share on Facebook Share on LinkedIn Share on X

Critical Vulnerability in the Linux Kernel: A New Privilege Escalation

A critical double-free vulnerability has been discovered in the pipapo set module of the NFT subsystem of the Linux kernel. An unprivileged attacker can exploit this vulnerability by sending a...
Share on Facebook Share on LinkedIn Share on X

RHC interviews Sector16, one of the most active hacktivist groups of 2025. “Let’s destroy the present for a better future”

In recent months, two disturbing episodes have shaken public opinion and the Italian cybersecurity sector. The first concerned an Italian hospital, violated in its most sensitive heart: videos of patients...
Share on Facebook Share on LinkedIn Share on X

Need a Microsoft Windows product key? No problem, ask Chat-GPT.

ChatGPT has once again proven vulnerable to unconventional manipulation: this time it issued valid Windows product keys, including one registered to the major bank Wells Fargo. The vulnerability was discovered...
Share on Facebook Share on LinkedIn Share on X

What is Cyber Security? Threats, Cybercrime, Protection, and Work

Cybersecurity has become one of the most important issues in the digital age we live in. With the increase in the number of connected devices, the widespread use of the...
Share on Facebook Share on LinkedIn Share on X

Attacks on Artificial Intelligence: Adversarial Attacks and Data Poisoning.

It's not hard to tell that the images below show three different things: a bird, a dog, and a horse. But to a machine learning algorithm, all three might look...
Share on Facebook Share on LinkedIn Share on X

AI Agents: The Intelligent Revolution Explained to Everyone

Imagine a digital assistant who not only answers your questions, but also acts for you, plans strategies, learns from its mistakes, and collaborates with others to solve complex problems. This...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
PurpleBravo’s Contagious Interview: Malware Campaign Targets Global Firms
Redazione RHC - 22/01/2026

For over a year, the North Korean group PurpleBravo has been running a targeted malware campaign called “Contagious Interview,” using fake job interviews to attack companies in Europe, Asia, the Middle East, and Central America.…

Immagine del sitoCybercrime
KONNI Malware Targets Crypto Developers with AI-Powered Attacks
Redazione RHC - 22/01/2026

Check Point Research recently discovered a sophisticated phishing campaign orchestrated by KONNI , a threat group linked to North Korea . Historically focused on diplomatic targets in South Korea, the malicious actor has now expanded…

Immagine del sitoCybercrime
Fortinet FortiOS Vulnerability Exploited: CVE-2025-59718 Patch Bypass
Redazione RHC - 22/01/2026

Attackers are exploiting a previously patched critical FortiGate authentication flaw (CVE-2025-59718) through a patch bypass method to breach protected firewalls, as Fortinet customers are experiencing. Fortinet reportedly plans to soon release FortiOS versions 7.4.11, 7.6.6,…

Immagine del sitoCybercrime
Cisco Zero-Day Vulnerability CVE-2026-20045 Actively Exploited
Redazione RHC - 22/01/2026

A critical zero-day remote code execution (RCE) vulnerability, identified as CVE-2026-20045, has been discovered by Cisco and is being actively exploited in active attacks. Cisco has urged immediate patching, and its Product Security Incident Response…

Immagine del sitoinnovation
Red Hot Cyber and Hack The Box: together for the CTF at the RHC 2026 conference
Redazione RHC - 21/01/2026

In the Italian and European cybersecurity landscape, few collaborations manage to combine educational vision, technical realism, and community impact as effectively as the partnership announced between Red Hot Cyber and Hack The Box (HTB) for…