Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
UtiliaCS 320x100
Crowdstriker 970×120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Will 2029 be the year of Q-Day? But what if the SHA1 replacement took 12 years? Cybercrime

Will 2029 be the year of Q-Day? But what if the SHA1 replacement took 12 years?

Security experts are increasingly talking about "Q-Day," the moment when quantum computers will be able to handle modern encryption algorithms....
Redazione RHC - 22 August 2025
Critical Downgrade Bug in Chat-GPT Leads to Jailbreak of Model Cybercrime

Critical Downgrade Bug in Chat-GPT Leads to Jailbreak of Model

A critical flaw found in OpenAI's latest model, ChatGPT-5, allows attackers to bypass advanced security features through the use of...
Redazione RHC - 22 August 2025
China’s Great Firewall blocks internet traffic for 74 minutes Cybercrime

China’s Great Firewall blocks internet traffic for 74 minutes

Researchers from the Great Firewall Report team noticed that on the night of August 20, China's Great Firewall experienced a...
Redazione RHC - 22 August 2025
A Criminal Hacker Sells Access to Roche Underground Servers Cybercrime

A Criminal Hacker Sells Access to Roche Underground Servers

A recent post on an underground forum has attracted the attention of cybersecurity experts. A user claimed to have sold...
Redazione RHC - 22 August 2025
972 million Google Play VPN users are at risk! Cybercrime

972 million Google Play VPN users are at risk!

Citizen Lab analysts have reported that more than 20 VPN apps on the Google Play Store have serious security issues...
Redazione RHC - 22 August 2025
FIDO Downgrade Attacks, a New Authentication Threat Cybercrime

FIDO Downgrade Attacks, a New Authentication Threat

Proofpoint researchers have identified a sophisticated downgrade attack that could bypass FIDO-based authentication, exposing targets to adversary-in-the-middle (AiTM) threats.These are...
Redazione RHC - 21 August 2025

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Browser-in-the-Browser Phishing Attack: How to Protect Yourself
Manuel Roccon - 29/12/2025

This article analyzes a recent and sophisticated phishing campaign that uses the Browser-in-the-Browser (BitB) technique to steal credentials, particularly those from services like Microsoft 365. The BitB attack is notable for its ability to generate…

Immagine del sitoCybercrime
Critical WebKit Vulnerability Exposes iOS Devices to Code Execution
Redazione RHC - 29/12/2025

A new report details a critical vulnerability discovered by security researcher Joseph Goydish in Apple’s WebKit engine. This security flaw, if exploited in conjunction with other exploits, could allow attackers to execute arbitrary code on…

Immagine del sitoCybercrime
Xspeeder Devices Hit by AI-Discovered Zero-Day Vulnerability CVE-2025-54322
Redazione RHC - 29/12/2025

When it comes to cybersecurity, it’s easy to fall into the trap of thinking that problems are always far away, that they only affect others. But the reality is that a vulnerability is always around…

Immagine del sitoCybercrime
Job Scams on Social Media: How to Avoid Fake Remote Job Offers
Redazione RHC - 29/12/2025

Fraudulent job ads promising easy money and remote work continue to flood social media, particularly in the Middle East and North Africa . Under the guise of part-time jobs that require no experience , scammers…

Immagine del sitoCybercrime
Cyber Criminals Recruit Insiders: Companies at Risk of Internal Threats
Redazione RHC - 27/12/2025

The cybercriminal community is rapidly increasing its interest in recruiting personnel from within companies . Instead of sophisticated external attacks, criminals are increasingly relying on internal sources— people willing to provide access to company systems…