Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
LECS 320x100 1
Banner Ransomfeed 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Discovering the Cyber Kill Chain. Defend your network and learn how to attack and defend yourself. Culture

Discovering the Cyber Kill Chain. Defend your network and learn how to attack and defend yourself.

In the digital age, cybersecurity has become a priority for businesses and individuals. Among the most fearsome threats are cyberattacks,...
Redazione RHC - 26 July 2025
What is Cyber Threat Intelligence? Let’s explore a fundamental discipline in cybersecurity. Culture

What is Cyber Threat Intelligence? Let’s explore a fundamental discipline in cybersecurity.

Cyber Threat Intelligence (CTI) is the practice of collecting, analyzing, and using cyber threat information to protect organizations from malicious...
Redazione RHC - 26 July 2025
What is Open Source Intelligence (OSINT). Its importance and necessity in today’s world. Cybercrime

What is Open Source Intelligence (OSINT). Its importance and necessity in today’s world.

The web contains a sea of information. Between social networks, newspapers, specialized magazines, images, radio, and television... we use and...
Redazione RHC - 26 July 2025
What are Vulnerability Assessments? A Journey into Automated Software Vulnerability Scanning Cybercrime

What are Vulnerability Assessments? A Journey into Automated Software Vulnerability Scanning

A vulnerability assessment is a process of evaluating computer systems, networks, and applications to identify vulnerabilities that could be exploited...
Redazione RHC - 26 July 2025
Is the Linux kernel moving toward “vibe coding”? Rules for using AI assistants are coming soon. Cybercrime

Is the Linux kernel moving toward “vibe coding”? Rules for using AI assistants are coming soon.

Sasha Levin, a longtime Linux kernel developer at NVIDIA and previously at Google and Microsoft, has proposed adding formal rules...
Redazione RHC - 26 July 2025
Google is turning the web into a showcase for AI! A near-term disaster for the digital economy. Cybercrime

Google is turning the web into a showcase for AI! A near-term disaster for the digital economy.

Google is turning its search engine into a showcase for artificial intelligence, and that could spell disaster for the entire...
Redazione RHC - 26 July 2025

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Gootloader Malware Returns with Enhanced Evasion Techniques
Redazione RHC - 17/01/2026

After a long period of silence, the Gootloader downloader malware has returned to the forefront. Last November, the Huntress team detected a new campaign signaling the return of a developer previously associated with the Vanilla…

Immagine del sitoCybercrime
VoidLink Malware: Advanced Linux Framework Targets Cloud Infrastructures
Redazione RHC - 16/01/2026

Check Point researchers have discovered a new Linux infection framework distinguished by its advanced modular architecture and wide range of features. The malware has been dubbed VoidLink . The framework is composed of over 30…

Immagine del sitoCybercrime
Microsoft Copilot Vulnerability Exposes User Data to Hackers
Redazione RHC - 15/01/2026

A recently fixed vulnerability allowed attackers to exploit Microsoft Copilot Personal with a single click to steal sensitive user data. Using a phishing link, attackers were able to take control of sessions without requiring further…

Immagine del sitoCybercrime
Progress Software Patches LoadMaster, MOVEit WAF Vulnerabilities
Redazione RHC - 15/01/2026

On January 12, 2026, Progress Software Corporation released patches that address two high-severity Command Injection vulnerabilities, which could allow remote attackers to execute malicious code on LoadMaster load balancers and MOVEit Web Application Firewalls (WAFs).…

Immagine del sitoCybercrime
24-Year-Old Hacker Breaches US Supreme Court Database
Redazione RHC - 14/01/2026

Do you remember the 24-year-old hacker Carmelo Miano and the breaches of the Naples Prosecutor’s Office’s accounts and computer systems? It appears something similar happened in the United States, and the other young man is…