Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
HackTheBox 320x100 1
970x120 Olympous

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Qilin Ransomware Strikes Deep into South Korean Finance Cybercrime

Qilin Ransomware Strikes Deep into South Korean Finance

Imagine waking up one morning and discovering that your sensitive financial data—contracts, customer lists, investment strategies—is exposed on a hidden...
Inva Malaj - 19 September 2025
Ready for AI-powered Notepad? Coming soon to Windows 11 with PC Copilot+! Cybercrime

Ready for AI-powered Notepad? Coming soon to Windows 11 with PC Copilot+!

Windows 11 users with PC Copilot+ will be able to take advantage of advanced artificial intelligence features, now an integral...
Redazione RHC - 19 September 2025
ShadowLeak Arrives: A 0-Click Bug in ChatGPT Leads to Sensitive Data Exfiltration Cybercrime

ShadowLeak Arrives: A 0-Click Bug in ChatGPT Leads to Sensitive Data Exfiltration

A new threat is beginning to emerge in the IT world: the world of artificial intelligence agents. ShadowLeak is a...
Redazione RHC - 19 September 2025
Generative Artificial Intelligence: Explosive Growth and Security Challenges Cybercrime

Generative Artificial Intelligence: Explosive Growth and Security Challenges

By Umberto Pirovano, Senior Manager Technical Solutions at Palo Alto Networks Generative Artificial Intelligence (GenAI) is redefining the technology and...
Redazione RHC - 19 September 2025
GitLab fixes critical vulnerability CVE-2025-6454 Cybercrime

GitLab fixes critical vulnerability CVE-2025-6454

The collaborative development platform GitLab has announced the fix for a critical vulnerability, identified as CVE-2025-6454. The issue affected server...
Redazione RHC - 18 September 2025
Supply Chain Wormable? NPM Packages with Self-Propagating Malware Arrive Cybercrime

Supply Chain Wormable? NPM Packages with Self-Propagating Malware Arrive

Security researchers have discovered the compromise of over 180 npm packages, infected with a self-propagating malware designed to infect other...
Redazione RHC - 18 September 2025

$200 for Access to an Italian Company! While the Dark Web is doing business, are you ready to defend yourself?

Following the case of the 568 endpoints of an Italian industrial machinery company, another compromised access related to an Italian software engineering company has ended up for sale on an underground forum...
Share on Facebook Share on LinkedIn Share on X

“Cleaning Up” Windows Update! Microsoft Declares War on Drivers Exploited in Ransomware Attacks

Microsoft announced that it will periodically remove outdated drivers from the Windows Update Catalog to reduce risk and improve compatibility. "The goal of this initiative is to provide the best set of...
Share on Facebook Share on LinkedIn Share on X
Cyberspazio: il filo invisibile tra guerra e pace

Cyberspace: The Invisible Thread Between War and Peace

How Iran-Israel’s Digital War Redefines Security, Diplomacy, and the Global Future? Since June 12, a 700% increase in cyber activity has been detected, resulting in a wave of DDoS attacks,...
Share on Facebook Share on LinkedIn Share on X

Kill Switch! Donald Trump’s Digital Weapon Threatening Europe

Donald Trump's return to the White House has becomea painful reminder for Europe of its main digital vulnerability: the "kill switch" effectively controlled by the United States. Political risks that...
Share on Facebook Share on LinkedIn Share on X

Cloudflare Mitigates 7.3 Terabits Per Second Attack. Imagine 9350 HD Movies Downloaded in 45 Seconds

In mid-May 2025, Cloudflare blocked the largest DDoS attack ever recorded: 7.3 terabits per second (Tbps). This event comes shortly after the release of the DDoS Threat Report for Q1...
Share on Facebook Share on LinkedIn Share on X

Myth: If I use a VPN, I am completely safe even on open and unsecured WiFi networks

Many believe that using a VPN guarantees total protection while browsing, even on completely open and unsafe WiFi networks. Although VPNs are effective tools for encrypting traffic and preventing data...
Share on Facebook Share on LinkedIn Share on X

Your VPN is a Trojan! Here are 17 Free Apps Made in China That Spy on You While Google and Apple Get Fat

"If you don't pay for the service, you are the product. This is true for social networks, but also for free VPNs: your data, your privacy, is often the real...
Share on Facebook Share on LinkedIn Share on X
sicari a pagamento

Murders Like a Drink! Dark Web Recruits Kids With Encrypted Apps in Europe

A worrying criminal trend is taking hold in Europe: criminal gangs are using encrypted apps to recruit teenagers as young as 14 to commit violent crimes, including contract killings. These...
Share on Facebook Share on LinkedIn Share on X
Fumetto sul cyberbullismo di Red Hot Cyber

“Byte The Silence”: RHC’s Free Shock Comic About Cyberbullying Out Today!

Today, June 23, 2025, "Byte The Silence" is released, the new comic about cyberbullying created by Red Hot Cyber, is available from today for free in electronic format, on our...
Share on Facebook Share on LinkedIn Share on X

FortiGate Under Attack: Tools for Mass Exploitation of Exposed APIs for Sale

A new and alarming development is shaking up the cybersecurity landscape: a malicious actor has advertised on the dark web a highly sophisticated exploit aimed at compromising FortiGate devices. A...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Fortinet FortiOS Vulnerability Exploited: CVE-2025-59718 Patch Bypass
Redazione RHC - 22/01/2026

Attackers are exploiting a previously patched critical FortiGate authentication flaw (CVE-2025-59718) through a patch bypass method to breach protected firewalls, as Fortinet customers are experiencing. Fortinet reportedly plans to soon release FortiOS versions 7.4.11, 7.6.6,…

Immagine del sitoCybercrime
Cisco Zero-Day Vulnerability CVE-2026-20045 Actively Exploited
Redazione RHC - 22/01/2026

A critical zero-day remote code execution (RCE) vulnerability, identified as CVE-2026-20045, has been discovered by Cisco and is being actively exploited in active attacks. Cisco has urged immediate patching, and its Product Security Incident Response…

Immagine del sitoinnovation
Red Hot Cyber and Hack The Box: together for the CTF at the RHC 2026 conference
Redazione RHC - 21/01/2026

In the Italian and European cybersecurity landscape, few collaborations manage to combine educational vision, technical realism, and community impact as effectively as the partnership announced between Red Hot Cyber and Hack The Box (HTB) for…

Immagine del sitoCybercrime
Everest Ransomware Attacks McDonald’s, 861GB Data Stolen
Redazione RHC - 21/01/2026

Yesterday, the Everest cybercriminal gang claimed responsibility for a cyberattack on McDonald’s on their Data Leak Site (DLS) . From the gang’s post, the cybercriminals claim to have 861GB of data exfiltrated from the company’s…

Immagine del sitoCybercrime
ESXi Zero-Day Exploit: How to Protect Your VMware Environment
Redazione RHC - 20/01/2026

A group of attackers is using a zero-day exploit toolkit to compromise VMware ESXi instances in an uncontrolled manner, taking advantage of multiple vulnerabilities to bypass virtual machine restrictions. The current incident highlights the ongoing…