Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Xi Jinping and the Chinese APT’s Ambition
Di Alessio Stefan - 08/09/2025

The post-COVID macro political movements, including ongoing conflicts, have prompted a majority of states to shift their medium- to long-term political objectives. Clearly, a paradigm shift has been v...

Salesloft Cyber Attack: Chatbot Drift Temporarily Disabled
Di Redazione RHC - 07/09/2025

Salesloft announced that it would temporarily deactivate its AI-powered chatbot Drift on September 5, after several companies were hit by a massive supply chain attack. The incident resulted in the ma...

Discover the Dark Web: Access, Secrets, and Helpful Links to the Onion Network
Di Redazione RHC - 06/09/2025

The Dark Web is a part of the internet that cannot be reached with standard browsers (Chrome, Firefox, Edge). To access it, you need to use specific tools like the Tor Browser, which guarantees anonym...

AI A2 detected 102 0-day bugs and created exploits in Android apps for $1.77
Di Redazione RHC - 06/09/2025

Artificial intelligence systems have been criticized for creating confusing vulnerability reports and inundating open-source developers with irrelevant complaints. But researchers at Nanjing Universit...

$16 billion in stolen Apple, Meta, and Google credentials up for sale for $121,000
Di Redazione RHC - 05/09/2025

The Darklab team, Red Hot Cyber‘s community of threat intelligence experts, has identified an ad on the dark web marketplace “Tor Amazon”, the criminal counterpart of the popular e-commerce site...

Phishing on Teams: at least the hacker responds faster than the real help desk!

In recent months, as previously reported on Red Hot Cyber, a new front has emerged in the corporate phishing landscape: Microsoft Teams attacks in whi...
Redazione RHC - 29/08/2025 - 09:02

It’s a global cyber shock! Beijing’s 007s are infiltrating and compromising the world’s Internet backbones.

The United States and several allied countries have issued a joint warning about a growing cyber offensive conducted by actors sponsored by the People...
Redazione RHC - 29/08/2025 - 08:42

Submarine cables are vulnerable! New strategies are needed.

Researchers from Reichman University (Israel) have detailed in an article in the journal Nature Electronics the growing risks and threats posed by nat...
Redazione RHC - 28/08/2025 - 20:54

Popular password managers, including LastPass, 1Password, and Bitwarden, are vulnerable to clickjacking.

A security expert has discovered that six of the most popular password managers, used by tens of millions of people, are vulnerable to clickjacking, a...
Redazione RHC - 28/08/2025 - 17:56

Vibe Coding: Revolution or Security Risk?

Martyn Ditchburn, CTO in residence Zscaler Artificial intelligence, like any technology, is not inherently good or bad: it all depends on who uses ...
Redazione RHC - 28/08/2025 - 14:36

Critical vulnerabilities in NetScaler ADC and Gateway. Update now! Attacks are ongoing!

NetScaler has alerted administrators of three new vulnerabilities in NetScaler ADC and NetScaler Gateway, one of which is already being used in active...
Redazione RHC - 28/08/2025 - 14:02
1 18 19 20 21 22 132

Phishing on Teams: at least the hacker responds faster than the real help desk!

- August 29th, 2025

In recent months, as previously reported on Red Hot Cyber, a new front has emerged in the corporate phishing landscape: Microsoft Teams attacks in which attackers impersonate IT or help...

  

It’s a global cyber shock! Beijing’s 007s are infiltrating and compromising the world’s Internet backbones.

- August 29th, 2025

The United States and several allied countries have issued a joint warning about a growing cyber offensive conducted by actors sponsored by the People's Republic of China. According to a...

  

Submarine cables are vulnerable! New strategies are needed.

- August 28th, 2025

Researchers from Reichman University (Israel) have detailed in an article in the journal Nature Electronics the growing risks and threats posed by natural and man-made factors to undersea communications cables,...

  

Popular password managers, including LastPass, 1Password, and Bitwarden, are vulnerable to clickjacking.

- August 28th, 2025

A security expert has discovered that six of the most popular password managers, used by tens of millions of people, are vulnerable to clickjacking, a phenomenon that allows attackers to...

  

Vibe Coding: Revolution or Security Risk?

- August 28th, 2025

Martyn Ditchburn, CTO in residence Zscaler Artificial intelligence, like any technology, is not inherently good or bad: it all depends on who uses it and for what purpose. What is...

  

Critical vulnerabilities in NetScaler ADC and Gateway. Update now! Attacks are ongoing!

- August 28th, 2025

NetScaler has alerted administrators of three new vulnerabilities in NetScaler ADC and NetScaler Gateway, one of which is already being used in active attacks. Updates are available and the vendor...

  

Sign up for the newsletter