Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Crowdstrike 320×100
970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Trial underway for the four damaged internet cables in the Baltic Sea. The captain: “I am not accused of any wrongdoing.” Cybercrime

Trial underway for the four damaged internet cables in the Baltic Sea. The captain: “I am not accused of any wrongdoing.”

The trial has begun for the crew of the oil tanker Eagle S, which tore several undersea cables in the...
Redazione RHC - 26 August 2025
The US Army evolves: more power for cyber and electronic operations Cybercrime

The US Army evolves: more power for cyber and electronic operations

The U.S. Army is increasingly investing in reintroducing electronic warfare capabilities among its troops, planning to equip division-level units with...
Redazione RHC - 26 August 2025
19 million installs of 77APP spread malware on Google Play Cybercrime

19 million installs of 77APP spread malware on Google Play

Zscaler researchers discovered that 77 malicious Android apps, with a combined total of over 19 million installs, were distributing various...
Redazione RHC - 26 August 2025
Happy birthday Windows 95: the system that changed PCs forever! Cybercrime

Happy birthday Windows 95: the system that changed PCs forever!

August 24, 2025, marked the 30th anniversary of the launch of Windows 95, Microsoft's first mass-market 32-bit consumer operating system,...
Redazione RHC - 26 August 2025
Stagershell: When malware leaves no trace. Malware Forge analysis. Cybercrime

Stagershell: When malware leaves no trace. Malware Forge analysis.

In early 2025, an Italian organization found itself the victim of a sneaky intrusion. No dramatic exploit, no textbook attack....
Sandro Sana - 26 August 2025
RDP Under Fire! 30,000 Unique IP Addresses Probe Exposed Services for Targeted Attacks Cybercrime

RDP Under Fire! 30,000 Unique IP Addresses Probe Exposed Services for Targeted Attacks

Security researchers at greyNoise have detected a large, coordinated scanning operation against Microsoft Remote Desktop Protocol (RDP) services, in which...
Redazione RHC - 26 August 2025

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Browser-in-the-Browser Phishing Attack: How to Protect Yourself
Manuel Roccon - 29/12/2025

This article analyzes a recent and sophisticated phishing campaign that uses the Browser-in-the-Browser (BitB) technique to steal credentials, particularly those from services like Microsoft 365. The BitB attack is notable for its ability to generate…

Immagine del sitoCybercrime
Critical WebKit Vulnerability Exposes iOS Devices to Code Execution
Redazione RHC - 29/12/2025

A new report details a critical vulnerability discovered by security researcher Joseph Goydish in Apple’s WebKit engine. This security flaw, if exploited in conjunction with other exploits, could allow attackers to execute arbitrary code on…

Immagine del sitoCybercrime
Xspeeder Devices Hit by AI-Discovered Zero-Day Vulnerability CVE-2025-54322
Redazione RHC - 29/12/2025

When it comes to cybersecurity, it’s easy to fall into the trap of thinking that problems are always far away, that they only affect others. But the reality is that a vulnerability is always around…

Immagine del sitoCybercrime
Job Scams on Social Media: How to Avoid Fake Remote Job Offers
Redazione RHC - 29/12/2025

Fraudulent job ads promising easy money and remote work continue to flood social media, particularly in the Middle East and North Africa . Under the guise of part-time jobs that require no experience , scammers…

Immagine del sitoCybercrime
Cyber Criminals Recruit Insiders: Companies at Risk of Internal Threats
Redazione RHC - 27/12/2025

The cybercriminal community is rapidly increasing its interest in recruiting personnel from within companies . Instead of sophisticated external attacks, criminals are increasingly relying on internal sources— people willing to provide access to company systems…