Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320x100 Itcentric
TM RedHotCyber 970x120 042543

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

No Miracle! The Pontifical Salesian University falls victim to ransomware. Cybercrime

No Miracle! The Pontifical Salesian University falls victim to ransomware.

On the night of August 19, the IT infrastructure of the Salesian Pontifical University (UPS) was the victim of a...
Redazione RHC - 26 August 2025
AI Phishing is here! ChatGPT, click here now to avoid losing access! Cybercrime

AI Phishing is here! ChatGPT, click here now to avoid losing access!

Phishing attacks are becoming increasingly sophisticated and are now targeting not only users, but also automated AI-based defenses. Researchers have...
Redazione RHC - 25 August 2025
Why Task Scheduler Has Become Security Teams’ Worst Nightmare Cybercrime

Why Task Scheduler Has Become Security Teams’ Worst Nightmare

Over the past twelve months, security experts have noticed an increase in attackers using Windows scheduling capabilities, intended for system...
Redazione RHC - 25 August 2025
200 car models vulnerable? ‘Killer’ firmware for Flipper Zero surfaces on the darknet. Cybercrime

200 car models vulnerable? ‘Killer’ firmware for Flipper Zero surfaces on the darknet.

The topic of hacking and car theft using Flipper Zero has returned to the forefront around the world, and we...
Redazione RHC - 25 August 2025
“Son, get access to your dad’s smartphone!” Sharp increase in fraud involving minors Cybercrime

“Son, get access to your dad’s smartphone!” Sharp increase in fraud involving minors

F6 has reported a sharp increase in fraud in which criminals exploit minors to access their parents' bank accounts. According...
Redazione RHC - 25 August 2025
Windows 11 Insider Preview: New features and improvements ahead Cybercrime

Windows 11 Insider Preview: New features and improvements ahead

Microsoft has released a new build 26200.5761 (KB5064093) of Windows 11 Insider Preview to Windows Insiders in the Dev Channel....
Redazione RHC - 25 August 2025

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Browser-in-the-Browser Phishing Attack: How to Protect Yourself
Manuel Roccon - 29/12/2025

This article analyzes a recent and sophisticated phishing campaign that uses the Browser-in-the-Browser (BitB) technique to steal credentials, particularly those from services like Microsoft 365. The BitB attack is notable for its ability to generate…

Immagine del sitoCybercrime
Critical WebKit Vulnerability Exposes iOS Devices to Code Execution
Redazione RHC - 29/12/2025

A new report details a critical vulnerability discovered by security researcher Joseph Goydish in Apple’s WebKit engine. This security flaw, if exploited in conjunction with other exploits, could allow attackers to execute arbitrary code on…

Immagine del sitoCybercrime
Xspeeder Devices Hit by AI-Discovered Zero-Day Vulnerability CVE-2025-54322
Redazione RHC - 29/12/2025

When it comes to cybersecurity, it’s easy to fall into the trap of thinking that problems are always far away, that they only affect others. But the reality is that a vulnerability is always around…

Immagine del sitoCybercrime
Job Scams on Social Media: How to Avoid Fake Remote Job Offers
Redazione RHC - 29/12/2025

Fraudulent job ads promising easy money and remote work continue to flood social media, particularly in the Middle East and North Africa . Under the guise of part-time jobs that require no experience , scammers…

Immagine del sitoCybercrime
Cyber Criminals Recruit Insiders: Companies at Risk of Internal Threats
Redazione RHC - 27/12/2025

The cybercriminal community is rapidly increasing its interest in recruiting personnel from within companies . Instead of sophisticated external attacks, criminals are increasingly relying on internal sources— people willing to provide access to company systems…