Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Gartner analysts have urged businesses to temporarily stop using browsers with built-in artificial intelligence (AI) capabilities . In a recent advisory, the company emphasizes that such tools pose un...

A critical vulnerability affecting the FortiOS, FortiWeb, FortiProxy , and FortiSwitchManager product lines has been reported by Fortinet via an urgent security advisory. This advisory was issued in c...

It seems the White House isn’t entirely clear … at least judging by yet another change of heart regarding the sale of Nvidia’s advanced chips to China, with the Trump administration having decid...

According to a recently released report by the Financial Crimes Enforcement Network (FinCEN) , global ransomware activity peaked in 2023, only to plummet in 2024. This decline is attributed to success...

Despite significant geopolitical challenges, the mercenary spyware industry remains a resilient and persistent threat; in this context, the well-known vendor Intellexa continues to expand its arsenal....
Underwater cables and the “cyber war of the seabed”. Between control, geopolitics and technology
Pig Butchering Scam: How Pig Slaughter Is Becoming an Emotional Addiction Scam
A new Poc Exploit allows Privilege Excalation on Linux using the udisksd daemon
Critical Vulnerabilities in SMBClient for macOS. 9.8 out of 10 for Effective RCE
Discovering Drumrlu. The IaB that does big business between Türkiye and Venezuela
Human Replatforming! Artificial Intelligence Threatens Half of Jobs

Underwater cables and the “cyber war of the seabed”. Between control, geopolitics and technology
Redazione RHC - July 7th, 2025
Author: 5ar0m4n Publishing Date: 11/7/2021 We have often addressed the topic of undersea cables on RHC where we talked about the first submarine cable in history and the last one...

Pig Butchering Scam: How Pig Slaughter Is Becoming an Emotional Addiction Scam
Redazione RHC - July 7th, 2025
In the interconnected labyrinth of the 21st century, where the desire for authenticity and the search for opportunity dance on the edge of paradox, a dark phenomenon emerges that challenges...

A new Poc Exploit allows Privilege Excalation on Linux using the udisksd daemon
Redazione RHC - July 7th, 2025
A proof-of-concept (PoC) exploit for a critical vulnerability that allows local privilege escalation has been developed, affecting several major Linux distributions, such as Fedora and SUSE. The vulnerability, tracked as...

Critical Vulnerabilities in SMBClient for macOS. 9.8 out of 10 for Effective RCE
Redazione RHC - July 7th, 2025
Experts have identified serious vulnerabilities in SMBClient for macOS that affect both user space and the operating system kernel. These vulnerabilities potentially allow remote execution of arbitrary code and disruption...

Discovering Drumrlu. The IaB that does big business between Türkiye and Venezuela
Redazione RHC - July 7th, 2025
After the Far East and Iran, we continue our series of articles on IAB actors with an actor believed to be based in Europe, in a NATO country. Origin and...

Human Replatforming! Artificial Intelligence Threatens Half of Jobs
Redazione RHC - July 7th, 2025
The chairman of the American car company Ford, Jim Farley, has released a statement sharp on the future of the job market in the age of artificial intelligence. According to...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

