Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
LECS 320x100 1
Redhotcyber Banner Sito 970x120px Uscita 101125

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Storm-0501: When Ransomware Moves to the Cloud Cybercrime

Storm-0501: When Ransomware Moves to the Cloud

Microsoft is raising the alarm: the Storm-0501 cybercriminal group has evolved. No more "traditional" attacks on on-premise machines, no more...
Luca Galuppi - 28 August 2025
Microsoft Teams crashes: Embedded Office documents blocked from opening Cybercrime

Microsoft Teams crashes: Embedded Office documents blocked from opening

A Black Thursday for millions of Microsoft Teams users around the world. A key feature of the collaboration platform –...
Luca Galuppi - 28 August 2025
ChatGPT “Taught My Son How to Die”! Adam Reid’s Parents Sue OpenAI Cybercrime

ChatGPT “Taught My Son How to Die”! Adam Reid’s Parents Sue OpenAI

A lawsuit has been filed against OpenAI in California, alleging that ChatGPT driven a 16-year-old to commit suicide. The parents...
Redazione RHC - 28 August 2025
By 2026, no more “ghost” apps: Android will only accept verified developers. Cybercrime

By 2026, no more “ghost” apps: Android will only accept verified developers.

Google representatives announced that starting in 2026, only apps from verified developers will be able to be installed on certified...
Redazione RHC - 27 August 2025
Devastating Cyber Attack Paralyzes Nevada Government Network Cybercrime

Devastating Cyber Attack Paralyzes Nevada Government Network

Nevada's government network was paralyzed after an incident in the early morning hours of August 24. The attack rendered the...
Redazione RHC - 27 August 2025
Auchan data leak: hundreds of thousands of customers affected by a hacker attack Cybercrime

Auchan data leak: hundreds of thousands of customers affected by a hacker attack

French retailer Auchan has informed hundreds of thousands of customers that their personal data has been stolen following a hacker...
Redazione RHC - 27 August 2025

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Browser-in-the-Browser Phishing Attack: How to Protect Yourself
Manuel Roccon - 29/12/2025

This article analyzes a recent and sophisticated phishing campaign that uses the Browser-in-the-Browser (BitB) technique to steal credentials, particularly those from services like Microsoft 365. The BitB attack is notable for its ability to generate…

Immagine del sitoCybercrime
Critical WebKit Vulnerability Exposes iOS Devices to Code Execution
Redazione RHC - 29/12/2025

A new report details a critical vulnerability discovered by security researcher Joseph Goydish in Apple’s WebKit engine. This security flaw, if exploited in conjunction with other exploits, could allow attackers to execute arbitrary code on…

Immagine del sitoCybercrime
Xspeeder Devices Hit by AI-Discovered Zero-Day Vulnerability CVE-2025-54322
Redazione RHC - 29/12/2025

When it comes to cybersecurity, it’s easy to fall into the trap of thinking that problems are always far away, that they only affect others. But the reality is that a vulnerability is always around…

Immagine del sitoCybercrime
Job Scams on Social Media: How to Avoid Fake Remote Job Offers
Redazione RHC - 29/12/2025

Fraudulent job ads promising easy money and remote work continue to flood social media, particularly in the Middle East and North Africa . Under the guise of part-time jobs that require no experience , scammers…

Immagine del sitoCybercrime
Cyber Criminals Recruit Insiders: Companies at Risk of Internal Threats
Redazione RHC - 27/12/2025

The cybercriminal community is rapidly increasing its interest in recruiting personnel from within companies . Instead of sophisticated external attacks, criminals are increasingly relying on internal sources— people willing to provide access to company systems…