Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Redhotcyber Banner Sito 320x100px Uscita 101125
Banner Ancharia Desktop 1 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Critical vulnerability in Apache Tomcat must be patched, otherwise the server could go into DoS. Cybercrime

Critical vulnerability in Apache Tomcat must be patched, otherwise the server could go into DoS.

A critical security flaw has been discovered in Apache Tomcat's HTTP/2 implementation. This vulnerability allows attackers to conduct malicious denial-of-service...
Redazione RHC - 15 August 2025
After Darcula comes Magic Mouse: the new phishing nightmare steals 650,000 cards a month. Cybercrime

After Darcula comes Magic Mouse: the new phishing nightmare steals 650,000 cards a month.

After the closure of the Darcula phishing platform and the Magic Cat software used by scammers, the Magic Mouse solution...
Redazione RHC - 14 August 2025
Fortinet VPN Under Attack: New Wave of Brute-Force Attacks Detected by GrayNoise Cybercrime

Fortinet VPN Under Attack: New Wave of Brute-Force Attacks Detected by GrayNoise

GreyNoise detected two major waves of attacks on Fortinet devices in early August 2025. The first, a brute-force attack targeting...
Redazione RHC - 14 August 2025
Whonix 17.4 is out! Only a 0day exploit can threaten your anonymity. Cybercrime

Whonix 17.4 is out! Only a 0day exploit can threaten your anonymity.

Version 17.4 of the Whonix distribution, designed to ensure greater anonymity online, has been released. The system is based on...
Redazione RHC - 14 August 2025
Backdoor in xz Utils: 35 Docker Hub images still infected Cybercrime

Backdoor in xz Utils: 35 Docker Hub images still infected

Analysts at Binarly have found at least 35 images on Docker Hub still infected with a backdoor that penetrated xz...
Redazione RHC - 14 August 2025
Huawei introduces algorithm that reduces dependence on foreign chips Cybercrime

Huawei introduces algorithm that reduces dependence on foreign chips

Huawei has unveiled a new software tool that speeds up large AI models by distributing data more efficiently across different...
Redazione RHC - 14 August 2025

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Google Fast Pair Vulnerability: WhisperPair Exposes Millions of Devices
Redazione RHC - 19/01/2026

Researchers from the Cybersecurity and Industrial Cryptography team at KU Leuven have discovered a critical flaw in the Google Fast Pair protocol. The vulnerability allows attackers to hijack control of millions of Bluetooth devices, track…

Immagine del sitoCybercrime
Elon Musk Sues OpenAI for $134 Billion Over AI Betrayal
Redazione RHC - 19/01/2026

Elon Musk has filed a staggering $134 billion in damages in a malicious lawsuit against OpenAI and Microsoft. According to Bloomberg , the latest lawsuit accuses OpenAI of betraying its core mission as a nonprofit…

Immagine del sitoCulture
Net-NTLMv1 Exploitation: Rainbow Tables for Modern Attacks
Redazione RHC - 18/01/2026

Mandiant has released a large set of rainbow tables dedicated to Net-NTLMv1 with the aim of concretely demonstrating how insecure this authentication protocol has become. Although Net-NTLMv1 has been deprecated for years and its weaknesses…

Immagine del sitoCybercrime
Your paycheck is zero! Congratulations, someone answered the phone wrong
Redazione RHC - 18/01/2026

No worker would accept their paycheck disappearing without explanation. It was precisely from a series of internal reports of this nature that an organization began investigating an apparently administrative anomaly, discovering instead a targeted cyber…

Immagine del sitoCybercrime
Two Ukrainians Suspected in Black Basta Ransomware Attacks
Redazione RHC - 17/01/2026

When it comes to cybersecurity, it’s not uncommon to come across news stories that seem straight out of a science fiction movie. Yet, the reality is even more surprising and sometimes disturbing. The story of…