Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
TM RedHotCyber 320x100 042514
970x20 Itcentric

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Discovering Predatory Sparrow: Identity, Goals, and Digital Arsenal of the Mysterious Threat Actor Cybercrime

Discovering Predatory Sparrow: Identity, Goals, and Digital Arsenal of the Mysterious Threat Actor

On June 17, 2025, a cyber attack paralyzed Bank Sepah, one of Iran's major financial institutions. The attack was claimed...
Redazione RHC - 1 July 2025
Famous hackers: the sad story of Jonathan James, aka c0mrade. Cybercrime

Famous hackers: the sad story of Jonathan James, aka c0mrade.

He was born on December 12, 1983, in a small village called Pinecrest located in Miami-Dade County, Florida. His father...
Redazione RHC - 1 July 2025
Famous Hackers: The Story of Gary McKinnon. Cybercrime

Famous Hackers: The Story of Gary McKinnon.

A few months after the attacks on the World Trade Center, a strange message appeared on a U.S. Army computer:...
Redazione RHC - 1 July 2025
DuckDuckGo Updates Scam Blocker: Say Goodbye to Online Scams and Fake Sites! Cybercrime

DuckDuckGo Updates Scam Blocker: Say Goodbye to Online Scams and Fake Sites!

The Scam Blocker tool built into DuckDuckGo browser has been updated to protect against online scams. Now detects fake e-commerce sites, cryptocurrency...
Redazione RHC - 1 July 2025
Cyberattacks on NFC contactless payments increase, new global threat Cybercrime

Cyberattacks on NFC contactless payments increase, new global threat

A new series of cyber attacks has been detected by ESET specialists, which sees the contactless payments sector with NFC...
Redazione RHC - 30 June 2025
The Race to 0day! China Advances in Offensive Cyberpower, While the US Is Forced to Chase Cybercrime

The Race to 0day! China Advances in Offensive Cyberpower, While the US Is Forced to Chase

China's growing rise has prompted U.S. officials to strongly emphasize the need to improve its offensive cyber capabilities. However, some...
Redazione RHC - 30 June 2025

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Microsoft Copilot Vulnerability Exposes User Data to Hackers
Redazione RHC - 15/01/2026

A recently fixed vulnerability allowed attackers to exploit Microsoft Copilot Personal with a single click to steal sensitive user data. Using a phishing link, attackers were able to take control of sessions without requiring further…

Immagine del sitoCybercrime
Progress Software Patches LoadMaster, MOVEit WAF Vulnerabilities
Redazione RHC - 15/01/2026

On January 12, 2026, Progress Software Corporation released patches that address two high-severity Command Injection vulnerabilities, which could allow remote attackers to execute malicious code on LoadMaster load balancers and MOVEit Web Application Firewalls (WAFs).…

Immagine del sitoCybercrime
24-Year-Old Hacker Breaches US Supreme Court Database
Redazione RHC - 14/01/2026

Do you remember the 24-year-old hacker Carmelo Miano and the breaches of the Naples Prosecutor’s Office’s accounts and computer systems? It appears something similar happened in the United States, and the other young man is…

Immagine del sitoCybercrime
Cloudflare vs Italy: The Battle for Internet Freedom and DNS Control
Redazione RHC - 14/01/2026

Cloudflare CEO Matthew Prince has threatened to shut down the company’s operations in Italy after the country’s telecom regulator fined it twice its annual revenue in the country. The facts The conflict erupted around Italy’s…

Immagine del sitoCybercrime
Cybercrime Meets Real-Life Violence: Foxtrot Network’s Dark Side
Redazione RHC - 13/01/2026

In recent months, there has been increasing talk of a paradigm shift in cybercrime . What for years was perceived as a predominantly digital ecosystem— consisting of fraud, identity theft, online extortion, and cyberattacks —is…