Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
UtiliaCS 320x100
2nd Edition GlitchZone RHC 970x120 2

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Iran Cyber Army: Spear-phishing attacks against governments around the world (including Italy!) Cybercrime

Iran Cyber Army: Spear-phishing attacks against governments around the world (including Italy!)

A recent Cyber Threat Intelligence (CTI) analysis conducted by DREAM has revealed details of a complex spear-phishing campaign that occurred...
Redazione RHC - 29 August 2025
China unveils KylinOS11 with AI integration: the national operating system that will replace Windows Cybercrime

China unveils KylinOS11 with AI integration: the national operating system that will replace Windows

China has unveiled KylinOS11, the largest update to its national operating system, which the government called a major step forward...
Redazione RHC - 29 August 2025
The Dawn supercomputer takes the fight against cancer: a new era of research with AI Cybercrime

The Dawn supercomputer takes the fight against cancer: a new era of research with AI

The project "A basic model for cancer vaccine design" has been shortlisted for an award from the UK government's prestigious...
Redazione RHC - 29 August 2025
China launches compact space debris removal system Cybercrime

China launches compact space debris removal system

Chinese scientists have unveiled a compact space launcher, initially designed to remove dangerous space debris, but which could potentially be...
Redazione RHC - 29 August 2025
What is Wetware: The Future of Brain Enhancement Through Hardware and Software innovation

What is Wetware: The Future of Brain Enhancement Through Hardware and Software

By definition, wetware refers to technology that combines hardware and software to enhance biological life forms. Steve M. Potter, an...
Massimiliano Brolli - 29 August 2025
AI browser extensions? There’s too much uncertainty: the risk still lies in user awareness! Cybercrime

AI browser extensions? There’s too much uncertainty: the risk still lies in user awareness!

Anthropic has raised the alarm about a new threat related to "smart" browser extensions: Websites can infiltrate hidden commands that...
Redazione RHC - 29 August 2025

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Job Scams on Social Media: How to Avoid Fake Remote Job Offers
Redazione RHC - 29/12/2025

Fraudulent job ads promising easy money and remote work continue to flood social media, particularly in the Middle East and North Africa . Under the guise of part-time jobs that require no experience , scammers…

Immagine del sitoCybercrime
Cyber Criminals Recruit Insiders: Companies at Risk of Internal Threats
Redazione RHC - 27/12/2025

The cybercriminal community is rapidly increasing its interest in recruiting personnel from within companies . Instead of sophisticated external attacks, criminals are increasingly relying on internal sources— people willing to provide access to company systems…

Immagine del sitoCybercrime
Villager Framework: AI-Powered Penetration Testing Tool
Redazione RHC - 26/12/2025

Straiker’s AI Research (STAR) team has identified Villager, a native AI-based penetration testing framework developed by the Chinese group Cyberspike . The tool, presented as a red team solution , is designed to fully automate…

Immagine del sitoCybercrime
A $500 Tool Claims to Kill EDRs at Kernel Level: Inside the NtKiller Underground Ad
Redazione RHC - 25/12/2025

An ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…

Immagine del sitoCybercrime
Webrat Malware Targets Security Researchers with GitHub Exploit Traps
Redazione RHC - 24/12/2025

There’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…