Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Ancharia Mobile 1
Enterprise BusinessLog 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
AI Alignment: Where Does AI Learn Right and Wrong?
Di Sergio Corpettini - 14/10/2025

The other day on LinkedIn, I found myself having a conversation with someone who was seriously interested in the topic of artificial intelligence applied to law. It wasn’t one of those barroom c...

Immagine del sito
Microsoft Patch Tuesday: 175 vulnerabilities fixed and two zero-days exploited
Di Redazione RHC - 14/10/2025

In its latest update, the tech giant fixed 175 vulnerabilities affecting its core products and underlying systems, including two actively exploited zero-day vulnerabilities , the company said in its l...

Immagine del sito
12 security bugs discovered in Ivanti Endpoint Manager (EPM). Update now!
Di Redazione RHC - 14/10/2025

Ivanti has published 13 vulnerabilities in its Endpoint Manager (EPM) software , including two high-severity flaws that could allow remote code execution and privilege escalation . Despite the lack of...

Immagine del sito
WhatsApp Web in the crosshairs! How the worm that distributes the banking Trojan works
Di Redazione RHC - 14/10/2025

Sophos analysts have discovered a complex malware operation by security experts that uses the popular messaging service WhatsApp to spread banking Trojans, targeting Brazilian banks and cryptocurrency...

Immagine del sito
RMPocalypse: A critical bug in AMD SEV-SNP threatens cloud security.
Di Redazione RHC - 13/10/2025

A critical vulnerability has been identified in the AMD SEV-SNP hardware security architecture, impacting major cloud providers (AWS, Microsoft Azure, and Google Cloud) . This flaw allows malicious hy...

Never accept USB flash drives from strangers! A practical example of physical hacking with a USB flash drive.

Have you ever been told that if you find a USB flash drive on the ground, you shouldn't plug it into your computer? Today, we'll explain why you shoul...
Massimiliano Brolli - 27/09/2025 - 11:50

An SVG file disguised as a PDF led victims to a fake login

Microsoft Threat Intelligence specialists have identified an attack in which attackers used artificial intelligence for the first time to disguise phi...
Redazione RHC - 27/09/2025 - 11:15

Airports shut down, ransomware, four days of chaos, and a suspect arrested. An attack that shook Europe.

On September 19, a major cyber incident occurred in Europe, affecting Collins Aerospace, one of the world's largest aerospace technology suppliers . T...
Redazione RHC - 27/09/2025 - 10:55

One added line of code and thousands of companies hacked. This is the magic of the Supply Chain!

Developers learned to trust the tools that help their AI assistants handle routine tasks, from sending emails to using databases. But this trust prove...
Redazione RHC - 27/09/2025 - 10:54

Rhadamanthys Stealer: Introduces an AI feature to extract seed phrases from images

Rhadamanthys is an advanced information stealer that first emerged in 2022. Featuring a rapid development cycle—with at least ten different releases s...
Redazione RHC - 26/09/2025 - 17:16

Active Directory nel mirino! Come i criminal hacker rubano NTDS.dit

Active Directory (AD) contains the organization's digital keys: unauthorized access to this service exposes sensitive information and credentials that...
Redazione RHC - 26/09/2025 - 16:16
1 24 25 26 27 28 189

Never accept USB flash drives from strangers! A practical example of physical hacking with a USB flash drive.

- September 27th, 2025

Have you ever been told that if you find a USB flash drive on the ground, you shouldn't plug it into your computer? Today, we'll explain why you shouldn't do...

Facebook Linkedin X

An SVG file disguised as a PDF led victims to a fake login

- September 27th, 2025

Microsoft Threat Intelligence specialists have identified an attack in which attackers used artificial intelligence for the first time to disguise phishing code. The goal was to steal credentials from companies...

Facebook Linkedin X

Airports shut down, ransomware, four days of chaos, and a suspect arrested. An attack that shook Europe.

- September 27th, 2025

On September 19, a major cyber incident occurred in Europe, affecting Collins Aerospace, one of the world's largest aerospace technology suppliers . The attack disrupted airline operations and affected flights...

Facebook Linkedin X

One added line of code and thousands of companies hacked. This is the magic of the Supply Chain!

- September 27th, 2025

Developers learned to trust the tools that help their AI assistants handle routine tasks, from sending emails to using databases. But this trust proved vulnerable: the postmark-mcp package, downloaded over...

Facebook Linkedin X

Rhadamanthys Stealer: Introduces an AI feature to extract seed phrases from images

- September 26th, 2025

Rhadamanthys is an advanced information stealer that first emerged in 2022. Featuring a rapid development cycle—with at least ten different releases since its inception—the malware is promoted and marketed on...

Facebook Linkedin X

Active Directory nel mirino! Come i criminal hacker rubano NTDS.dit

- September 26th, 2025

Active Directory (AD) contains the organization's digital keys: unauthorized access to this service exposes sensitive information and credentials that can lead to a complete domain compromise. Among the most critical...

Facebook Linkedin X
Most Read Articles of the Month Most Read Articles of the Week
  1. The Truth About Windows XP License Key: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8
  2. Computer science graduates with no future! Thousands of resumes ignored, and goodbye to six-figure salaries.
  3. With 50 dollars and physical access to the server, the Cloud goes to hell
  4. Shocking collapse: -71% of job offers for software engineers in three years
  5. Hackers hit the United States: critical federal infrastructure compromised
  1. The Truth About Windows XP License Key: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8
  2. Microsoft 365 Outage: Thousands of Users Affected Worldwide
  3. Is your VPN protecting you or spying on you? 800 free VPNs analyzed with disturbing results.
  4. GitHub is migrating to Azure! And goodbye to new development for a year.
  5. Hacker culture pioneer Peter Samson plays “Boards of Canada” on PDP-1

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE