Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
LECS 320x100 1
LECS 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

AI assistants lie! After generating errors: “I was panicking.” Cybercrime

AI assistants lie! After generating errors: “I was panicking.”

AI-powered programming assistants present themselves as tools capable of transforming any English text into working code. Users no longer need...
Redazione RHC - 30 July 2025
Sanctions are taking effect! Zhaoxin introduces KH-5000 server processors and KX-7000N desktop chip. Cybercrime

Sanctions are taking effect! Zhaoxin introduces KH-5000 server processors and KX-7000N desktop chip.

The Chinese company Zhaoxin presented a new generation of KH-5000 server processors at Expo 2025 in Shanghai. These chips are...
Redazione RHC - 30 July 2025
The United States is cutting spending on cybersecurity again and it’s a storm Cybercrime

The United States is cutting spending on cybersecurity again and it’s a storm

In the first months of Donald Trump's new presidency, the U.S. federal government made drastic cuts to cybersecurity spending, cutting...
Redazione RHC - 29 July 2025
What is tailgating? When penetration tests aren’t enough and the Red Team needs physical security checks. Hacking

What is tailgating? When penetration tests aren’t enough and the Red Team needs physical security checks.

In red teaming, the term "tailgating" refers to a technique in which a team member attempts to gain unauthorized access...
Redazione RHC - 29 July 2025
What is a Bug Bounty and what is a responsible disclosure program? Cybercrime

What is a Bug Bounty and what is a responsible disclosure program?

In recent years, concerns about cybersecurity have grown exponentially. The increase in cyber attacks, the advancement of hacking techniques, and...
Redazione RHC - 29 July 2025
Digital Forensics: The Science That Uncovers the Secrets Hidden in Data Cybercrime

Digital Forensics: The Science That Uncovers the Secrets Hidden in Data

Digital Forensics, or computer forensics, is a discipline that deals with the collection, preservation, analysis, and presentation of digital data...
Sandro Sana - 29 July 2025

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Two Ukrainians Suspected in Black Basta Ransomware Attacks
Redazione RHC - 17/01/2026

When it comes to cybersecurity, it’s not uncommon to come across news stories that seem straight out of a science fiction movie. Yet, the reality is even more surprising and sometimes disturbing. The story of…

Immagine del sitoCybercrime
Gootloader Malware Returns with Enhanced Evasion Techniques
Redazione RHC - 17/01/2026

After a long period of silence, the Gootloader downloader malware has returned to the forefront. Last November, the Huntress team detected a new campaign signaling the return of a developer previously associated with the Vanilla…

Immagine del sitoCybercrime
VoidLink Malware: Advanced Linux Framework Targets Cloud Infrastructures
Redazione RHC - 16/01/2026

Check Point researchers have discovered a new Linux infection framework distinguished by its advanced modular architecture and wide range of features. The malware has been dubbed VoidLink . The framework is composed of over 30…

Immagine del sitoCybercrime
Microsoft Copilot Vulnerability Exposes User Data to Hackers
Redazione RHC - 15/01/2026

A recently fixed vulnerability allowed attackers to exploit Microsoft Copilot Personal with a single click to steal sensitive user data. Using a phishing link, attackers were able to take control of sessions without requiring further…

Immagine del sitoCybercrime
Progress Software Patches LoadMaster, MOVEit WAF Vulnerabilities
Redazione RHC - 15/01/2026

On January 12, 2026, Progress Software Corporation released patches that address two high-severity Command Injection vulnerabilities, which could allow remote attackers to execute malicious code on LoadMaster load balancers and MOVEit Web Application Firewalls (WAFs).…