Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
320x100 Itcentric
970x20 Itcentric

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Microsoft Exchange Server Penetration Testing: Techniques, Tools, and Countermeasures
Di Alessandro Molinari - 06/11/2025

Often, during penetration testing, we find ourselves with elevated access (Domain Admin) within an organization. Some companies stop there, thinking that obtaining Domain Admin is the ultimate goal. B...

Immagine del sito
Notepad++ under attack! How a fake DLL opens the door to criminal hackers
Di Manuel Roccon - 06/11/2025

A new vulnerability affecting Notepad++ was released in September. The vulnerability has been identified as CVE-2025-56383, and details can be found on the NIST website. CVE-2025-56383 is a DLL hijack...

Immagine del sito
A dangerous zero-day zero-click exploit threatens billions of Android devices
Di Redazione RHC - 05/11/2025

Google has issued an urgent advisory regarding a critical vulnerability in Android that allows attackers to execute arbitrary code on the device without any user interaction. The Zero Click vulnerabil...

Immagine del sito
Does Microsoft use macOS to create Windows wallpapers? Probably!
Di Redazione RHC - 04/11/2025

On October 29, Microsoft released a wallpaper to commemorate the eleventh anniversary of the Windows Insider program, and it is speculated that it was created using macOS. Let us remember that Windows...

Immagine del sito
Louvre Theft: Windows 2000 and Windows XP on Networks, as Well as Simple Passwords
Di Redazione RHC - 04/11/2025

As we know, the thieves in the “theft of the century” entered through a second-floor window of the Louvre Museum, but the museum had other problems besides unprotected windows. Although Cu...

Anatomy of a Data Theft: Technical Analysis of the “Formbook” Infostealer

In the cyber threat landscape, few malware programs are as persistent and widespread as Formbook . What began as a simple keylogger and form grabber h...
Redazione RHC - 27/10/2025 - 07:03

OpenAI is working on a neural network for music creation

According to The Information, OpenAI is actively working on its own neural network for music creation , which will compete with projects like Suno and...
Redazione RHC - 26/10/2025 - 17:41

Oracle VirtualBox Vulnerability: Risk of Virtual Machine Escape

BI.ZONE specialists have identified two vulnerabilities (CVE-2025-62592 and CVE-2025-61760) in Oracle VirtualBox. When combined, they allowed an attac...
Redazione RHC - 26/10/2025 - 16:33

YouTube Ghost Network: The phantom network that infected millions of users

Google specialists removed over 3,000 videos from YouTube that spread hidden information disguised as hacked software and video game cheats. Check Poi...
Redazione RHC - 26/10/2025 - 16:25

While Pope Francis is alive and continues his ministry, disinformation is rampant.

A survey conducted by the European Broadcasting Union (EBU), with support from the BBC, has highlighted that the most popular chatbots tend to distort...
Redazione RHC - 26/10/2025 - 09:45

New submarine cables in the Black Sea: Europe seeks digital independence from Russia

Eastern Europe is preparing for a new phase in telecommunications security. An ambitious submarine cable project, called Kardesa , will connect Bulgar...
Redazione RHC - 26/10/2025 - 09:21
1 15 16 17 18 19 222

Anatomy of a Data Theft: Technical Analysis of the “Formbook” Infostealer

- October 27th, 2025

In the cyber threat landscape, few malware programs are as persistent and widespread as Formbook . What began as a simple keylogger and form grabber has evolved into a powerful...

Facebook Linkedin X

OpenAI is working on a neural network for music creation

- October 26th, 2025

According to The Information, OpenAI is actively working on its own neural network for music creation , which will compete with projects like Suno and Udio. The publication's sources report...

Facebook Linkedin X

Oracle VirtualBox Vulnerability: Risk of Virtual Machine Escape

- October 26th, 2025

BI.ZONE specialists have identified two vulnerabilities (CVE-2025-62592 and CVE-2025-61760) in Oracle VirtualBox. When combined, they allowed an attacker to exit a virtual machine and reach the ARM-based macOS host system....

Facebook Linkedin X

YouTube Ghost Network: The phantom network that infected millions of users

- October 26th, 2025

Google specialists removed over 3,000 videos from YouTube that spread hidden information disguised as hacked software and video game cheats. Check Point researchers dubbed this campaign " YouTube Ghost Network"...

Facebook Linkedin X

While Pope Francis is alive and continues his ministry, disinformation is rampant.

- October 26th, 2025

A survey conducted by the European Broadcasting Union (EBU), with support from the BBC, has highlighted that the most popular chatbots tend to distort news , changing its meaning, confusing...

Facebook Linkedin X

New submarine cables in the Black Sea: Europe seeks digital independence from Russia

- October 26th, 2025

Eastern Europe is preparing for a new phase in telecommunications security. An ambitious submarine cable project, called Kardesa , will connect Bulgaria, Georgia, Turkey, and Ukraine without crossing Russian territorial...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE