Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
TM RedHotCyber 320x100 042514
Fortinet 970x120px

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Edge vs. Chrome: Microsoft promotes its browser with aggressive ads on Bing Cybercrime

Edge vs. Chrome: Microsoft promotes its browser with aggressive ads on Bing

Microsoft has once again launched an aggressive campaign for its proprietary Edge browser. This time, the software giant is displaying...
Redazione RHC - 21 September 2025
Will Nvidia’s robotic brain revolutionize artificial intelligence and robotics? Cybercrime

Will Nvidia’s robotic brain revolutionize artificial intelligence and robotics?

On August 24, the official Nvidia Robotics account shared an image on social media of a black gift box accompanied...
Redazione RHC - 21 September 2025
Qilin leads ransomware attacks as new groups emerge underground Cybercrime

Qilin leads ransomware attacks as new groups emerge underground

Qilin continues to lead the way among all active crypto attack groups, significantly lagging behind its competitors in the number...
Redazione RHC - 21 September 2025
RevengeHotels Improves VenomRAT with Artificial Intelligence Cybercrime

RevengeHotels Improves VenomRAT with Artificial Intelligence

Kaspersky Lab experts have detected a new wave of attacks by the RevengeHotels group. A distinctive feature of this campaign...
Redazione RHC - 21 September 2025
Security Alert: Vulnerability in Ivanti Endpoint Manager Mobile. CISA Warns Cybercrime

Security Alert: Vulnerability in Ivanti Endpoint Manager Mobile. CISA Warns

The U.S. Cybersecurity Agency (CISA) has issued an alert regarding two malware kits discovered on the network of an unidentified...
Redazione RHC - 21 September 2025
Root in less than two minutes: How Phoenix exploits vulnerabilities in DDR5 module TRRs. Cybercrime

Root in less than two minutes: How Phoenix exploits vulnerabilities in DDR5 module TRRs.

Anew variant of Rowhammer attacks has been developed that can bypass the latest security mechanisms in SK Hynix DDR5 chips....
Redazione RHC - 20 September 2025

The first message ever sent over the internet

Today exchanging a message via WhatsApp or Skype is a normal gesture, which is part of the activities we carry out in our daily lives. In all history books, it...
Share on Facebook Share on LinkedIn Share on X

Discovering Predatory Sparrow: Identity, Goals, and Digital Arsenal of the Mysterious Threat Actor

On June 17, 2025, a cyber attack paralyzed Bank Sepah, one of Iran's major financial institutions. The attack was claimed by the Predatory Sparrow group, already known for its destructive...
Share on Facebook Share on LinkedIn Share on X

Famous hackers: the sad story of Jonathan James, aka c0mrade.

He was born on December 12, 1983, in a small village called Pinecrest located in Miami-Dade County, Florida. His father was a computer programmer and his mother was a housewife....
Share on Facebook Share on LinkedIn Share on X

Famous Hackers: The Story of Gary McKinnon.

A few months after the attacks on the World Trade Center, a strange message appeared on a U.S. Army computer: "Your security system is shit" it read. "I am Alone....
Share on Facebook Share on LinkedIn Share on X

DuckDuckGo Updates Scam Blocker: Say Goodbye to Online Scams and Fake Sites!

The Scam Blocker tool built into DuckDuckGo browser has been updated to protect against online scams. Now detects fake e-commerce sites, cryptocurrency exchanges, and scareware. DuckDuckGo browser, which is entering public beta...
Share on Facebook Share on LinkedIn Share on X

Cyberattacks on NFC contactless payments increase, new global threat

A new series of cyber attacks has been detected by ESET specialists, which sees the contactless payments sector with NFC technology as the protagonist. This type of attack was initially...
Share on Facebook Share on LinkedIn Share on X

The Race to 0day! China Advances in Offensive Cyberpower, While the US Is Forced to Chase

China's growing rise has prompted U.S. officials to strongly emphasize the need to improve its offensive cyber capabilities. However, some doubts remain about the ability to meet the challenge, given...
Share on Facebook Share on LinkedIn Share on X

Cyberbullying and Digital Terror: Why Betti’s Comic Makes You Feel Uncomfortable (and That’s a Good Thing)

When I decided to write this story of Betti, it was certainly not to make a “nice” or “easy” comic, to read on a sunny afternoon at the beach and...
Share on Facebook Share on LinkedIn Share on X

Miniaturized Military Drone, Mosquito-Sized Model Arrives and China Offers It

In the military sector, the trend to miniaturize drones seems to know no limits, especially when the goal is to operate without being detected. An example of this race to...
Share on Facebook Share on LinkedIn Share on X

Cybersecurity, Italy on the podium with four young people. There is also Leonardo already protagonist in the RHC CTF

The first edition of the International Cybersecurity Olympiad ended in Singapore with an excellent result for Italy. Four Italian students reached the podium, winning gold and silver medals in the...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Fortinet FortiOS Vulnerability Exploited: CVE-2025-59718 Patch Bypass
Redazione RHC - 22/01/2026

Attackers are exploiting a previously patched critical FortiGate authentication flaw (CVE-2025-59718) through a patch bypass method to breach protected firewalls, as Fortinet customers are experiencing. Fortinet reportedly plans to soon release FortiOS versions 7.4.11, 7.6.6,…

Immagine del sitoCybercrime
Cisco Zero-Day Vulnerability CVE-2026-20045 Actively Exploited
Redazione RHC - 22/01/2026

A critical zero-day remote code execution (RCE) vulnerability, identified as CVE-2026-20045, has been discovered by Cisco and is being actively exploited in active attacks. Cisco has urged immediate patching, and its Product Security Incident Response…

Immagine del sitoinnovation
Red Hot Cyber and Hack The Box: together for the CTF at the RHC 2026 conference
Redazione RHC - 21/01/2026

In the Italian and European cybersecurity landscape, few collaborations manage to combine educational vision, technical realism, and community impact as effectively as the partnership announced between Red Hot Cyber and Hack The Box (HTB) for…

Immagine del sitoCybercrime
Everest Ransomware Attacks McDonald’s, 861GB Data Stolen
Redazione RHC - 21/01/2026

Yesterday, the Everest cybercriminal gang claimed responsibility for a cyberattack on McDonald’s on their Data Leak Site (DLS) . From the gang’s post, the cybercriminals claim to have 861GB of data exfiltrated from the company’s…

Immagine del sitoCybercrime
ESXi Zero-Day Exploit: How to Protect Your VMware Environment
Redazione RHC - 20/01/2026

A group of attackers is using a zero-day exploit toolkit to compromise VMware ESXi instances in an uncontrolled manner, taking advantage of multiple vulnerabilities to bypass virtual machine restrictions. The current incident highlights the ongoing…