Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Cyber Offensive Fundamentals 320x200 V0.1
970x20 Itcentric

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Viral Minds: How the Internet Turned Social Contagion Into a Global Psychological Weapon Culture

Viral Minds: How the Internet Turned Social Contagion Into a Global Psychological Weapon

Stop scrolling for a moment and look around you. Every meme, every viral video, every outrage-fueled hashtag, are you sure...
Ashleigh Crause - 20 July 2025
Millions of vehicles at risk of RCE attacks via the PerfektBlue Bluetooth bug Cybercrime

Millions of vehicles at risk of RCE attacks via the PerfektBlue Bluetooth bug

Four vulnerabilities, dubbed PerfektBlue, affect OpenSynergy's Bluetooth BlueSDK stack. The vulnerabilities allow remote execution of arbitrary code and could contribute...
Redazione RHC - 20 July 2025
Mercedes-Benz and Microsoft are teaming up to integrate Teams and Copilot 365 into cars starting this summer. Cybercrime

Mercedes-Benz and Microsoft are teaming up to integrate Teams and Copilot 365 into cars starting this summer.

On July 16, Mercedes-Benz announced in a press release the expansion of its collaboration with Microsoft, introducing the latest Office...
Redazione RHC - 20 July 2025
What is ICT Risk Management? A process that supports cybersecurity. Cybercrime

What is ICT Risk Management? A process that supports cybersecurity.

ICT Risk Management is a process that identifies, assesses, and manages risks related to the use of information and communications...
Redazione RHC - 20 July 2025
How to Start a Cyber Security Program: The First Steps Cybercrime

How to Start a Cyber Security Program: The First Steps

Cybersecurity has become a crucial component for protecting corporate information and sensitive data. Starting a cybersecurity program is not only...
Redazione RHC - 20 July 2025
What are Side Channel Attacks? How they work and how to defend data from cyber threat physics. Culture

What are Side Channel Attacks? How they work and how to defend data from cyber threat physics.

Side Channel Attacks represent a sophisticated category of cyber threats that focus on weaknesses in security systems. These attacks differ...
Redazione RHC - 20 July 2025

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
VoidLink Malware: Advanced Linux Framework Targets Cloud Infrastructures
Redazione RHC - 16/01/2026

Check Point researchers have discovered a new Linux infection framework distinguished by its advanced modular architecture and wide range of features. The malware has been dubbed VoidLink . The framework is composed of over 30…

Immagine del sitoCybercrime
Microsoft Copilot Vulnerability Exposes User Data to Hackers
Redazione RHC - 15/01/2026

A recently fixed vulnerability allowed attackers to exploit Microsoft Copilot Personal with a single click to steal sensitive user data. Using a phishing link, attackers were able to take control of sessions without requiring further…

Immagine del sitoCybercrime
Progress Software Patches LoadMaster, MOVEit WAF Vulnerabilities
Redazione RHC - 15/01/2026

On January 12, 2026, Progress Software Corporation released patches that address two high-severity Command Injection vulnerabilities, which could allow remote attackers to execute malicious code on LoadMaster load balancers and MOVEit Web Application Firewalls (WAFs).…

Immagine del sitoCybercrime
24-Year-Old Hacker Breaches US Supreme Court Database
Redazione RHC - 14/01/2026

Do you remember the 24-year-old hacker Carmelo Miano and the breaches of the Naples Prosecutor’s Office’s accounts and computer systems? It appears something similar happened in the United States, and the other young man is…

Immagine del sitoCybercrime
Cloudflare vs Italy: The Battle for Internet Freedom and DNS Control
Redazione RHC - 14/01/2026

Cloudflare CEO Matthew Prince has threatened to shut down the company’s operations in Italy after the country’s telecom regulator fined it twice its annual revenue in the country. The facts The conflict erupted around Italy’s…