Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320x100 Itcentric
Banner Desktop

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

PoC Zero-Click Exploit on iPhone and Mac: How Two Bytes Can Compromise the Apple Ecosystem Cybercrime

PoC Zero-Click Exploit on iPhone and Mac: How Two Bytes Can Compromise the Apple Ecosystem

An in-depth analysis and proof-of-concept example has been released regarding CVE-2025-43300, a critical security flaw in Apple's image processing infrastructure...
Redazione RHC - 25 August 2025
Your kidneys for sale on the dark web! The DaVita ransomware attack affects 2.4 million patients Cybercrime

Your kidneys for sale on the dark web! The DaVita ransomware attack affects 2.4 million patients

DaVita, an American company that operates a network of over 2,600 hemodialysis centers in the United States, reported a serious...
Redazione RHC - 24 August 2025
ChatGPT, will it be your new life companion? Humans are saying goodnight to AI Cybercrime

ChatGPT, will it be your new life companion? Humans are saying goodnight to AI

The artificial intelligence revolution is transforming not only work and productivity, but also personal relationships. More and more users report...
Redazione RHC - 24 August 2025
DeepSeek launches version 3.1 of its AI model with support for Chinese chips Cybercrime

DeepSeek launches version 3.1 of its AI model with support for Chinese chips

There was a day when DeepSeek surprised half the world by demonstrating that much could be done with less. Today...
Redazione RHC - 24 August 2025
Microsoft is investigating an Exchange Online outage affecting the Outlook mobile app Cybercrime

Microsoft is investigating an Exchange Online outage affecting the Outlook mobile app

A serious issue with the Exchange Online service, flagged as EX1137017, is currently under investigation by Microsoft. Due to this...
Redazione RHC - 24 August 2025
Can a file name compromise a Linux system? Chinese hackers say so Cybercrime

Can a file name compromise a Linux system? Chinese hackers say so

Researchers at Trellix have discovered an unusual attack pattern on Linux, in which the key element is not an attachment...
Redazione RHC - 24 August 2025

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Browser-in-the-Browser Phishing Attack: How to Protect Yourself
Manuel Roccon - 29/12/2025

This article analyzes a recent and sophisticated phishing campaign that uses the Browser-in-the-Browser (BitB) technique to steal credentials, particularly those from services like Microsoft 365. The BitB attack is notable for its ability to generate…

Immagine del sitoCybercrime
Critical WebKit Vulnerability Exposes iOS Devices to Code Execution
Redazione RHC - 29/12/2025

A new report details a critical vulnerability discovered by security researcher Joseph Goydish in Apple’s WebKit engine. This security flaw, if exploited in conjunction with other exploits, could allow attackers to execute arbitrary code on…

Immagine del sitoCybercrime
Xspeeder Devices Hit by AI-Discovered Zero-Day Vulnerability CVE-2025-54322
Redazione RHC - 29/12/2025

When it comes to cybersecurity, it’s easy to fall into the trap of thinking that problems are always far away, that they only affect others. But the reality is that a vulnerability is always around…

Immagine del sitoCybercrime
Job Scams on Social Media: How to Avoid Fake Remote Job Offers
Redazione RHC - 29/12/2025

Fraudulent job ads promising easy money and remote work continue to flood social media, particularly in the Middle East and North Africa . Under the guise of part-time jobs that require no experience , scammers…

Immagine del sitoCybercrime
Cyber Criminals Recruit Insiders: Companies at Risk of Internal Threats
Redazione RHC - 27/12/2025

The cybercriminal community is rapidly increasing its interest in recruiting personnel from within companies . Instead of sophisticated external attacks, criminals are increasingly relying on internal sources— people willing to provide access to company systems…