Red Hot Cyber. The Cybersecurity Blog

Pope warns: “AI is not the devil, but it can become one without ethics”
The head of the Catholic Churchhas expressed concern about the way today’s children and adolescents interact with digital technologies. In his viewthe abundance of information available through neural networks and other intelligent systems can seriously affect the mental and intellectual

Microsoft 365 Under Attack: How Hackers Use Direct Send to Send Phishing Emails
A sophisticated phishing campaign that targeted over 70 organizations by exploiting Microsoft 365’s Direct Send feature. The campaign, which began in May 2025 and has shown steady activity over the past two months, primarily targets U.S.-based organizations across multiple industries

Warning! WinRAR: Critical Vulnerability That Could Run Malware
WinRAR developers have fixed a Directory Traversal vulnerability, which has been assigned the identifier CVE-2025-6218. Under certain circumstances, this bug allowed malware to be executed after the archive was extracted. The vulnerability received a score of 7.8 on the CVSS

He died because of ransomware! Another victim joins the list
This is not the first time that a cyber attack has resulted in the loss of human lives.We had already discussed it in the article “I deferichò per il ransomware. I casi noto, le tendenze e il punto sull’Italia“, in

A new fileless infostealer is being spread by Telegram and legitimate services
TLP: AMBERAnalyst: Agostino Pellegrino, Crescenzo Cuoppolo, Alessio BandiniLast revision date: 2025-06-24 This forensic technical report documents the complete analysis of a multi-stage infostealer delivered via a Python fileless loader, identified with the acronym “AP”. The entire infection chain runs in

Citrix: New Critical Vulnerability from 9.2 Affects NetScaler – Attacks Underway!
Citrix has reported a new critical vulnerability in its NetScaler appliances, already actively exploited by attackers. The problem is identified with the identifier CVE-2025-6543 and affects the popular NetScaler ADC and NetScaler Gateway solutions used by companies for remote access

Cybersecurity, from NIS2 to the Cyber Resilience Act: Fortinet guides companies in compliance with the new regulatory landscape
Redazione RHC - June 27th, 2025
By Aldo Di Mattia, Director of Specialized Systems Engineering and Cybersecurity Advisor Italy and Malta at Fortinet After years of defining new regulatory strategies, the regulatory landscape, particularly in Europe,...

Critical Vulnerabilities Discovered in Hundreds of Brother and Other Printers
Redazione RHC - June 27th, 2025
Hundreds of printer models from Brother and other manufacturers (Fujifilm, Toshiba, Ricoh and Konica Minolta) have been found to be vulnerable to serious vulnerabilities discovered by researchers at Rapid7. For...

Pope warns: “AI is not the devil, but it can become one without ethics”
Redazione RHC - June 27th, 2025
The head of the Catholic Churchhas expressed concern about the way today's children and adolescents interact with digital technologies. In his viewthe abundance of information available through neural networks and...

Microsoft 365 Under Attack: How Hackers Use Direct Send to Send Phishing Emails
Redazione RHC - June 27th, 2025
A sophisticated phishing campaign that targeted over 70 organizations by exploiting Microsoft 365's Direct Send feature. The campaign, which began in May 2025 and has shown steady activity over the...
Sign up for the newsletter