Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Cyber Offensive Fundamentals 320x200 V0.1
HackTheBox 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

China kicks off the race for innovation with its first AI competition Cybercrime

China kicks off the race for innovation with its first AI competition

The city of Karamay, Xinjiang, hosted the opening of the finals and exhibition of the first AI Applications Competition. The...
Redazione RHC - 20 September 2025
A major cyberattack hits European airports. Flights grounded. Cybercrime

A major cyberattack hits European airports. Flights grounded.

On Saturday, September 20, 2025, a cyberattack hit a service provider used by several European airports, including Brussels, Berlin, and...
Redazione RHC - 20 September 2025
Submarine Cables: Japan Declares War on Chinese Suppliers Cybercrime

Submarine Cables: Japan Declares War on Chinese Suppliers

After the United States decided to restrict access to undersea communications cables using Chinese technology, Japan also initiated a plan...
Redazione RHC - 20 September 2025
A social network made entirely of bots! The University of Amsterdam experiment Cybercrime

A social network made entirely of bots! The University of Amsterdam experiment

Researchers at the University of Amsterdam conducted a novel experiment, creating a social network populated exclusively by artificial intelligence bots....
Redazione RHC - 20 September 2025
DeepSeek under fire: 50% of malicious code produced on sensitive queries Cybercrime

DeepSeek under fire: 50% of malicious code produced on sensitive queries

Specialists at CrowdStrike conducted a series of experiments with the Chinese artificial intelligence system DeepSeek, testing its code generation based...
Redazione RHC - 20 September 2025
Russian influence network CopyCop creates over 300 websites to spread disinformation Cybercrime

Russian influence network CopyCop creates over 300 websites to spread disinformation

Since March 2025, Insikt Group of Recorded Future observed CopyCop (also known as Storm-1516), a covert Russian influence network, creating...
Redazione RHC - 20 September 2025

Cyber Security: CISA and NSA Recommend Secure Programming Languages

The main US cybersecurity agencies, CISA and NSA, have published a joint document recommending that software developers opt for programming languages considered "memory safe". These languages are designed to provide...
Share on Facebook Share on LinkedIn Share on X

Apple and Google under pressure: German regulator wants to remove DeepSeek

Following the Italian data protection regulator, Germany's data protection watchdog has now asked Apple and Alphabet subsidiary Google to remove the Chinese artificial intelligence (AI) startup's DeepSeek app from their...
Share on Facebook Share on LinkedIn Share on X

A former Australian university student has been accused of hacking Western Sydney University

New South Wales police have arrested a 27-year-old former Western Sydney University student who had repeatedly hacked into the university's systems, including to obtain cheaper parking. Western Sydney University is...
Share on Facebook Share on LinkedIn Share on X

Cyber War: The Invisible War in Cyberspace That Decides the Conflicts of the Present

In the heart of contemporary conflicts, alongside tanks, drones and troops, an invisible, silent and often underestimated war is being fought: cyber war. It is not just a futuristic scenario...
Share on Facebook Share on LinkedIn Share on X

Skynet is coming: the malware that attacks Artificial Intelligence!

An unusual example of malicious code has been discovered in a real computing environment, which for the first time recorded an attempt to attack not classical defense mechanisms, but directly...
Share on Facebook Share on LinkedIn Share on X

Cybersecurity, from NIS2 to the Cyber Resilience Act: Fortinet guides companies in compliance with the new regulatory landscape

By Aldo Di Mattia, Director of Specialized Systems Engineering and Cybersecurity Advisor Italy and Malta at Fortinet After years of defining new regulatory strategies, the regulatory landscape, particularly in Europe,...
Share on Facebook Share on LinkedIn Share on X

Critical Vulnerabilities Discovered in Hundreds of Brother and Other Printers

Hundreds of printer models from Brother and other manufacturers (Fujifilm, Toshiba, Ricoh and Konica Minolta) have been found to be vulnerable to serious vulnerabilities discovered by researchers at Rapid7. For...
Share on Facebook Share on LinkedIn Share on X

Pope warns: “AI is not the devil, but it can become one without ethics”

The head of the Catholic Churchhas expressed concern about the way today's children and adolescents interact with digital technologies. In his viewthe abundance of information available through neural networks and...
Share on Facebook Share on LinkedIn Share on X

Microsoft 365 Under Attack: How Hackers Use Direct Send to Send Phishing Emails

A sophisticated phishing campaign that targeted over 70 organizations by exploiting Microsoft 365's Direct Send feature. The campaign, which began in May 2025 and has shown steady activity over the...
Share on Facebook Share on LinkedIn Share on X

Warning! WinRAR: Critical Vulnerability That Could Run Malware

WinRAR developers have fixed a Directory Traversal vulnerability, which has been assigned the identifier CVE-2025-6218. Under certain circumstances, this bug allowed malware to be executed after the archive was extracted....
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Fortinet FortiOS Vulnerability Exploited: CVE-2025-59718 Patch Bypass
Redazione RHC - 22/01/2026

Attackers are exploiting a previously patched critical FortiGate authentication flaw (CVE-2025-59718) through a patch bypass method to breach protected firewalls, as Fortinet customers are experiencing. Fortinet reportedly plans to soon release FortiOS versions 7.4.11, 7.6.6,…

Immagine del sitoCybercrime
Cisco Zero-Day Vulnerability CVE-2026-20045 Actively Exploited
Redazione RHC - 22/01/2026

A critical zero-day remote code execution (RCE) vulnerability, identified as CVE-2026-20045, has been discovered by Cisco and is being actively exploited in active attacks. Cisco has urged immediate patching, and its Product Security Incident Response…

Immagine del sitoinnovation
Red Hot Cyber and Hack The Box: together for the CTF at the RHC 2026 conference
Redazione RHC - 21/01/2026

In the Italian and European cybersecurity landscape, few collaborations manage to combine educational vision, technical realism, and community impact as effectively as the partnership announced between Red Hot Cyber and Hack The Box (HTB) for…

Immagine del sitoCybercrime
Everest Ransomware Attacks McDonald’s, 861GB Data Stolen
Redazione RHC - 21/01/2026

Yesterday, the Everest cybercriminal gang claimed responsibility for a cyberattack on McDonald’s on their Data Leak Site (DLS) . From the gang’s post, the cybercriminals claim to have 861GB of data exfiltrated from the company’s…

Immagine del sitoCybercrime
ESXi Zero-Day Exploit: How to Protect Your VMware Environment
Redazione RHC - 20/01/2026

A group of attackers is using a zero-day exploit toolkit to compromise VMware ESXi instances in an uncontrolled manner, taking advantage of multiple vulnerabilities to bypass virtual machine restrictions. The current incident highlights the ongoing…