Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
LECS 320x100 1
LECS 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Italy under DDoS attack by pro-Russian NoName057(16)? Few disruptions. Cybercrime

Italy under DDoS attack by pro-Russian NoName057(16)? Few disruptions.

The hackers of NoName057(16) have recently resumed their hostile activities against several Italian targets, using Distributed Denial-of-Service (DDoS) attacks. Based...
Redazione RHC - 18 September 2025
Google Chrome: Urgent patch for exploited 0day. Critical vulnerabilities fixed. Cybercrime

Google Chrome: Urgent patch for exploited 0day. Critical vulnerabilities fixed.

Google has taken immediate security action for Chrome browser users globally, targeting four critical vulnerabilities, one of which, a zero-day...
Redazione RHC - 18 September 2025
Phishing with style! Cybercriminals attach superhero GIFs to malware. Cybercrime

Phishing with style! Cybercriminals attach superhero GIFs to malware.

F6 analysts have published a study on a new phishing campaign active from spring 2025. The group, dubbed ComicForm, sent...
Redazione RHC - 18 September 2025
Will this latest article “against” ChatControl be absolutely useless? Cybercrime

Will this latest article “against” ChatControl be absolutely useless?

We had already discussed the proposed "ChatControl" regulation almost two years ago, but given the roadmap currently underway, we find...
Stefano Gazzella - 18 September 2025
Azure Functions in the Spotlight: Legitimate Libraries Used for DLL Sideloading Cybercrime

Azure Functions in the Spotlight: Legitimate Libraries Used for DLL Sideloading

A malicious version of the ISO image named Servicenow-BNM-Verify.iso has been identified on VirusTotal, reported as originating from Malaysia, with...
Redazione RHC - 18 September 2025
Linux Hit by Sindoor Dropper: Highly Obfuscated Infection Chain Cybercrime

Linux Hit by Sindoor Dropper: Highly Obfuscated Infection Chain

Linux systems are being targeted by a recent malware campaign, known as "Sindoor Dropper," which uses advanced spear-phishing techniques and...
Redazione RHC - 18 September 2025

Connected and Vulnerable: How to Secure OT and ICS in 2025

In today's interconnected world, cybersecurity is not just about protecting information. Today, most devices and physical tools are connected to the network in some way. Whether for its structural operation...
Share on Facebook Share on LinkedIn Share on X

Darkcloux 3.0 is here: Securonis Linux becomes more secure (and more extreme) than ever

Securonis Linux has released its most significant update: version 3.0 of "Darkcloux" and the 3.0-r1 patch. The release includes new utilities, redesigned components, and improvements to privacy and security. The main change...
Share on Facebook Share on LinkedIn Share on X

Urobot watches you while you pee (but it’s for your own good)

A Taiwanese hospital is testing Urobot, a smart urinal that instantly analyzes urine and emails the results. Although the device is designed in a "cute" style, social media users have...
Share on Facebook Share on LinkedIn Share on X

Smart TV or Living Room Spies? Here’s How They’re Monitoring You

Many owners of smart TV operating systems are increasingly finding themselves caught in a conflict that rages between the desire to preserve viewer privacy and pressure from the advertising industry....
Share on Facebook Share on LinkedIn Share on X

Massive Windows Crash: The OpenVPN Flaw That Can Knock Out Infrastructures

A critical vulnerability has been discovered in the OpenVPN data channel offload driver for Windows, which can be exploited by local attackers to crash systems. The bug, classified as CVE-2025-50054,...
Share on Facebook Share on LinkedIn Share on X

Android Under Attack: Godfather Malware Now Uses Virtualization to Fool Everyone

A new version of Android malware Godfather has been discovered that creates isolated virtual environments on mobile devices to steal data from banking applications. Recall that Godfather was first discovered in March...
Share on Facebook Share on LinkedIn Share on X

ChatGPT is Shutting Down Our Brains! Alarming MIT Research Shows Mental Decay

During a RHC Conference, Corrado Giustozzi underlined a truth as simple as it is powerful: “Human beings have always been creators of amplifiers.”. From the wheel to the car, every...
Share on Facebook Share on LinkedIn Share on X

AKIRA emergency report: the ransomware that is breaching Italy

Spring 2025 will be remembered as a turning point in our country's cyber chronicle. As bulletins and technical releases follow one another, one fact emerges glaringly: AKIRA has entered the...
Share on Facebook Share on LinkedIn Share on X

RHC GhostSec interview: hacktivism in the shadows of terrorism and cyber conflict

Ghost Security, also known as GhostSec, is a hacktivist group which emerged in the context of the cyber war against Islamic extremism. The first actions of the group date back...
Share on Facebook Share on LinkedIn Share on X

Group-IB contributes to INTERPOL’s Operation Secure, leading to the arrest of 32 suspects linked to information stealer malware in Asia

[Singapore; 11 June, 2025] Group-IB, a leading creator of cybersecurity technologies to investigate, prevent, and fight digital crime, announced today that it has contributed to INTERPOL’s “Operation Secure”, which took...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Cisco Zero-Day Vulnerability CVE-2026-20045 Actively Exploited
Redazione RHC - 22/01/2026

A critical zero-day remote code execution (RCE) vulnerability, identified as CVE-2026-20045, has been discovered by Cisco and is being actively exploited in active attacks. Cisco has urged immediate patching, and its Product Security Incident Response…

Immagine del sitoinnovation
Red Hot Cyber and Hack The Box: together for the CTF at the RHC 2026 conference
Redazione RHC - 21/01/2026

In the Italian and European cybersecurity landscape, few collaborations manage to combine educational vision, technical realism, and community impact as effectively as the partnership announced between Red Hot Cyber and Hack The Box (HTB) for…

Immagine del sitoCybercrime
Everest Ransomware Attacks McDonald’s, 861GB Data Stolen
Redazione RHC - 21/01/2026

Yesterday, the Everest cybercriminal gang claimed responsibility for a cyberattack on McDonald’s on their Data Leak Site (DLS) . From the gang’s post, the cybercriminals claim to have 861GB of data exfiltrated from the company’s…

Immagine del sitoCybercrime
ESXi Zero-Day Exploit: How to Protect Your VMware Environment
Redazione RHC - 20/01/2026

A group of attackers is using a zero-day exploit toolkit to compromise VMware ESXi instances in an uncontrolled manner, taking advantage of multiple vulnerabilities to bypass virtual machine restrictions. The current incident highlights the ongoing…

Immagine del sitoCybercrime
Google Fast Pair Vulnerability: WhisperPair Exposes Millions of Devices
Redazione RHC - 19/01/2026

Researchers from the Cybersecurity and Industrial Cryptography team at KU Leuven have discovered a critical flaw in the Google Fast Pair protocol. The vulnerability allows attackers to hijack control of millions of Bluetooth devices, track…