Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
LECS 320x100 1
Fortinet 970x120px

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

A former CIA agent sold state secrets for personal gain Cybercrime

A former CIA agent sold state secrets for personal gain

Former CIA agent Dale Britt Bandler is at the center of a high-profile criminal case: he used his access to...
Redazione RHC - 20 September 2025
Microsoft launches its “AI factory”: the most powerful supercomputer ever built. Cybercrime

Microsoft launches its “AI factory”: the most powerful supercomputer ever built.

Microsoft has unveiled a new generation of data centers designed specifically for artificial intelligence. The flagship facility is called Microsoft...
Redazione RHC - 19 September 2025
Critical vulnerability in Microsoft Login ID: risk of total takeover Cybercrime

Critical vulnerability in Microsoft Login ID: risk of total takeover

Microsoft has closed a critical bug that could have severely compromised its cloud environments: Dutch researcher Dirk-Jan Mollema discovered two...
Redazione RHC - 19 September 2025
Will you soon be fired? AI surpasses humans in the Coding Olympics. Cybercrime

Will you soon be fired? AI surpasses humans in the Coding Olympics.

Google DeepMind and OpenAI's artificial intelligence have achieved gold-level results in a competition dubbed the "Programming Olympics." The companies' models...
Redazione RHC - 19 September 2025
Two Scattered Spider activists found guilty of TfL cyber attack Cybercrime

Two Scattered Spider activists found guilty of TfL cyber attack

Two young men involved in the Scattered Spider group have been charged as part of the National Crime Agency investigation...
Redazione RHC - 19 September 2025
NVIDIA’s demise in China! Tech companies ordered to stop purchasing GPUs. Cybercrime

NVIDIA’s demise in China! Tech companies ordered to stop purchasing GPUs.

Chinese authorities have ordered the country's largest tech companies, including Libaba, ByteDance, and Tencent, to stop purchasing Nvidia GPUs. The...
Redazione RHC - 19 September 2025

He died because of ransomware! Another victim joins the list

This is not the first time that a cyber attack has resulted in the loss of human lives.We had already discussed it in the article "I deferichò per il ransomware....
Share on Facebook Share on LinkedIn Share on X

A new fileless infostealer is being spread by Telegram and legitimate services

TLP: AMBERAnalyst: Agostino Pellegrino, Crescenzo Cuoppolo, Alessio BandiniLast revision date: 2025-06-24 This forensic technical report documents the complete analysis of a multi-stage infostealer delivered via a Python fileless loader, identified...
Share on Facebook Share on LinkedIn Share on X

Citrix: New Critical Vulnerability from 9.2 Affects NetScaler – Attacks Underway!

Citrix has reported a new critical vulnerability in its NetScaler appliances, already actively exploited by attackers. The problem is identified with the identifier CVE-2025-6543 and affects the popular NetScaler ADC...
Share on Facebook Share on LinkedIn Share on X

Fox Kitten and Br0k3r: The Iranian Cyber Contractor Collaborating with Ransomware Gangs

We continue our series of articles on IABs by writing about an Iranian cyber contractor that not only works as an initial access broker but also provides support to ransomware...
Share on Facebook Share on LinkedIn Share on X

REvil: Sentenced but then set free. The most controversial court case ever

Do you remember the infamous REvil cyber gang? The Russian hacker group responsible for some of the most devastating ransomware attacks in the early days of this global threat, known...
Share on Facebook Share on LinkedIn Share on X

Shock in France: the gentlemen of BreachForums were twenty-year-old French citizens!

Shocking news in France: one of the largest global cybercrime networks dismantled. The BreachForum hackers were… French. French authorities have busted a large cybercrime operation, arresting five young French hackers...
Share on Facebook Share on LinkedIn Share on X

Zero-Click Attack on Notepad++. HackerHood Tested the Exploit and It Really Works with Little

A dangerous vulnerability has been discovered in the latest version of the popular text editor Notepad++ that allows an attacker togain complete control over the system. The vulnerability has been...
Share on Facebook Share on LinkedIn Share on X

22,000 Sites At Risk: New Motors WordPress Vulnerability Allows Total Hacking

Attackers are actively exploiting a critical privilege escalation vulnerability in the WordPress Motors theme, allowing them to hijack administrator accounts and take complete control of the target site. The malicious activity was...
Share on Facebook Share on LinkedIn Share on X

Qilin & Associates Law Firm: Ransomware Hires Lawyers, Launches “Intimidation Package”

The developers of the Qilin ransomware (recently interviewed by us) offered their partners the help and advice of a team of lawyers, so that they could put pressure on the...
Share on Facebook Share on LinkedIn Share on X

US-Iran Cyberwar: DHS Raises Alarm, American Networks Under Attack

The United States has warned of possible cyber attacks by pro-Iranian groups following a series of airstrikes against Iranian nuclear facilities, as part of the armed conflict between Iran and...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Fortinet FortiOS Vulnerability Exploited: CVE-2025-59718 Patch Bypass
Redazione RHC - 22/01/2026

Attackers are exploiting a previously patched critical FortiGate authentication flaw (CVE-2025-59718) through a patch bypass method to breach protected firewalls, as Fortinet customers are experiencing. Fortinet reportedly plans to soon release FortiOS versions 7.4.11, 7.6.6,…

Immagine del sitoCybercrime
Cisco Zero-Day Vulnerability CVE-2026-20045 Actively Exploited
Redazione RHC - 22/01/2026

A critical zero-day remote code execution (RCE) vulnerability, identified as CVE-2026-20045, has been discovered by Cisco and is being actively exploited in active attacks. Cisco has urged immediate patching, and its Product Security Incident Response…

Immagine del sitoinnovation
Red Hot Cyber and Hack The Box: together for the CTF at the RHC 2026 conference
Redazione RHC - 21/01/2026

In the Italian and European cybersecurity landscape, few collaborations manage to combine educational vision, technical realism, and community impact as effectively as the partnership announced between Red Hot Cyber and Hack The Box (HTB) for…

Immagine del sitoCybercrime
Everest Ransomware Attacks McDonald’s, 861GB Data Stolen
Redazione RHC - 21/01/2026

Yesterday, the Everest cybercriminal gang claimed responsibility for a cyberattack on McDonald’s on their Data Leak Site (DLS) . From the gang’s post, the cybercriminals claim to have 861GB of data exfiltrated from the company’s…

Immagine del sitoCybercrime
ESXi Zero-Day Exploit: How to Protect Your VMware Environment
Redazione RHC - 20/01/2026

A group of attackers is using a zero-day exploit toolkit to compromise VMware ESXi instances in an uncontrolled manner, taking advantage of multiple vulnerabilities to bypass virtual machine restrictions. The current incident highlights the ongoing…