Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
HackTheBox 320x100 1
Banner Ransomfeed 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

What are Living off the Land (LotL) attacks? Cybercrime

What are Living off the Land (LotL) attacks?

Living off the land means surviving on what you can forage, hunt, or grow, making the most of what nature...
Redazione RHC - 29 July 2025
10 steps to make your company cyber-secure: the RHC guide. Cybercrime

10 steps to make your company cyber-secure: the RHC guide.

In recent weeks, cyber activity on the internet - due to the Russia-Ukraine conflict - has increased significantly. In recent...
Olivia Terragni - 29 July 2025
Who put the mouse in the trap? Malware was hidden in the Endgame Gear drivers. Cybercrime

Who put the mouse in the trap? Malware was hidden in the Endgame Gear drivers.

Gaming peripheral manufacturer Endgame Gear reported that between June 26 and July 9, 2025, malware was inserted into the company's...
Redazione RHC - 29 July 2025
Your email is “vibrating”! A “hot” flaw in Lovense exposes users’ emails. Cybercrime

Your email is “vibrating”! A “hot” flaw in Lovense exposes users’ emails.

The Lovense platform, which has long carved out a niche market for itself with app-controlled sex toys (including models such...
Redazione RHC - 29 July 2025
Quantum computers are slowly evolving. Although far away, they have surpassed a millisecond state of coherence. Cybercrime

Quantum computers are slowly evolving. Although far away, they have surpassed a millisecond state of coherence.

Physicists at Aalto University (Finland) have set a new world record for the duration of the coherent state of a...
Redazione RHC - 29 July 2025
New macOS bug allows TCC bypass to steal user data Cybercrime

New macOS bug allows TCC bypass to steal user data

Microsoft said that attackers may have exploited a recently patched Transparency, Consent, and Control (TCC) bypass vulnerability to steal sensitive...
Redazione RHC - 29 July 2025

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Two Ukrainians Suspected in Black Basta Ransomware Attacks
Redazione RHC - 17/01/2026

When it comes to cybersecurity, it’s not uncommon to come across news stories that seem straight out of a science fiction movie. Yet, the reality is even more surprising and sometimes disturbing. The story of…

Immagine del sitoCybercrime
Gootloader Malware Returns with Enhanced Evasion Techniques
Redazione RHC - 17/01/2026

After a long period of silence, the Gootloader downloader malware has returned to the forefront. Last November, the Huntress team detected a new campaign signaling the return of a developer previously associated with the Vanilla…

Immagine del sitoCybercrime
VoidLink Malware: Advanced Linux Framework Targets Cloud Infrastructures
Redazione RHC - 16/01/2026

Check Point researchers have discovered a new Linux infection framework distinguished by its advanced modular architecture and wide range of features. The malware has been dubbed VoidLink . The framework is composed of over 30…

Immagine del sitoCybercrime
Microsoft Copilot Vulnerability Exposes User Data to Hackers
Redazione RHC - 15/01/2026

A recently fixed vulnerability allowed attackers to exploit Microsoft Copilot Personal with a single click to steal sensitive user data. Using a phishing link, attackers were able to take control of sessions without requiring further…

Immagine del sitoCybercrime
Progress Software Patches LoadMaster, MOVEit WAF Vulnerabilities
Redazione RHC - 15/01/2026

On January 12, 2026, Progress Software Corporation released patches that address two high-severity Command Injection vulnerabilities, which could allow remote attackers to execute malicious code on LoadMaster load balancers and MOVEit Web Application Firewalls (WAFs).…