Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Cyber Offensive Fundamentals 320x200 V0.1
Redhotcyber Banner Sito 970x120px Uscita 101125

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Figure 02, the robot that loads the dishwasher with precision Cybercrime

Figure 02, the robot that loads the dishwasher with precision

California-based company Figure has unveiled another milestone for its humanoid Figure 02: the robot loaded a dishwasher with high precision...
Redazione RHC - 5 September 2025
If Flash is dead, here’s the SVG Assassin! Phishing 2.0 is in high definition. Cybercrime

If Flash is dead, here’s the SVG Assassin! Phishing 2.0 is in high definition.

Cybercriminals have launched a new wave of attacks using SVG files to distribute phishing pages. Experts at VirusTotal have reported...
Redazione RHC - 5 September 2025
The Dark Side of Windows Drivers: How to Steal Data While Ignoring EDR Cybercrime

The Dark Side of Windows Drivers: How to Steal Data While Ignoring EDR

A recent study conducted by Workday's Offensive Security team highlighted a vulnerability in Windows drivers that effectively bypasses Endpoint Detection...
Redazione RHC - 5 September 2025
Zero-day vulnerability affecting TP-Link routers: what to know until the patch is released Cybercrime

Zero-day vulnerability affecting TP-Link routers: what to know until the patch is released

A new zero-day vulnerability has been discovered affecting several TP-Link router models. The issue, identified as a buffer overflow in...
Redazione RHC - 5 September 2025
Beyond espionage: “Salt Typhoon” also reportedly targeted Donald Trump Cybercrime

Beyond espionage: “Salt Typhoon” also reportedly targeted Donald Trump

A vast Chinese cyberespionage operation, dubbed "Salt Typhoon," was recently described as the most ambitious ever attributed to Beijing. According...
Redazione RHC - 5 September 2025
GhostRedirector: The Black SEO Redirect Campaign That Manipulates Search Engines Cybercrime

GhostRedirector: The Black SEO Redirect Campaign That Manipulates Search Engines

A cybercriminal group, dubbed GhostRedirector by ESET researchers and linked to the Chinese ecosystem, has quietly deployed a global search...
Redazione RHC - 5 September 2025

Avoiding the fis-hack-erman’s hook (aka Detecting a Phishing email)

Author: Antonio PiovesanPubblication Date: 09/08/2021 With the increase of ransomware infections - often instigated through phishing emails, it's very important/crucial to take proactive measures to help protect yourself and your...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
ESXi Zero-Day Exploit: How to Protect Your VMware Environment
Redazione RHC - 20/01/2026

A group of attackers is using a zero-day exploit toolkit to compromise VMware ESXi instances in an uncontrolled manner, taking advantage of multiple vulnerabilities to bypass virtual machine restrictions. The current incident highlights the ongoing…

Immagine del sitoCybercrime
Google Fast Pair Vulnerability: WhisperPair Exposes Millions of Devices
Redazione RHC - 19/01/2026

Researchers from the Cybersecurity and Industrial Cryptography team at KU Leuven have discovered a critical flaw in the Google Fast Pair protocol. The vulnerability allows attackers to hijack control of millions of Bluetooth devices, track…

Immagine del sitoCybercrime
Elon Musk Sues OpenAI for $134 Billion Over AI Betrayal
Redazione RHC - 19/01/2026

Elon Musk has filed a staggering $134 billion in damages in a malicious lawsuit against OpenAI and Microsoft. According to Bloomberg , the latest lawsuit accuses OpenAI of betraying its core mission as a nonprofit…

Immagine del sitoCulture
Net-NTLMv1 Exploitation: Rainbow Tables for Modern Attacks
Redazione RHC - 18/01/2026

Mandiant has released a large set of rainbow tables dedicated to Net-NTLMv1 with the aim of concretely demonstrating how insecure this authentication protocol has become. Although Net-NTLMv1 has been deprecated for years and its weaknesses…

Immagine del sitoCybercrime
Your paycheck is zero! Congratulations, someone answered the phone wrong
Redazione RHC - 18/01/2026

No worker would accept their paycheck disappearing without explanation. It was precisely from a series of internal reports of this nature that an organization began investigating an apparently administrative anomaly, discovering instead a targeted cyber…