Welcome to Red Hot Cyber | Cybersecurity News
Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Ancharia Mobile 1
Banner Ancharia Desktop 1 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
DeadLock Ransomware Exploits Baidu Antivirus Vulnerability for EDR Bypass
Di Redazione RHC - 11/12/2025

Cisco Talos has identified a new ransomware campaign called DeadLock : attackers are exploiting a vulnerable Baidu antivirus driver (CVE-2024-51324) to disable EDR systems using the Bring Your Own Vul...

Immagine del sito
Uncovering Russia’s Cyber Operations: CISM’s Role in DDoS Attacks
Di Redazione RHC - 11/12/2025

What we wrote in the article ” Patriotic Code: from DDoSia and NoName057(16) to CISM, the algorithm that shapes youth for Putin ” on Red Hot Cyber on July 23rd is now fully consistent with the inf...

Immagine del sito
Gartner Warns: AI-Powered Browsers Pose Significant Security Risks to Businesses
Di Redazione RHC - 10/12/2025

Gartner analysts have urged businesses to temporarily stop using browsers with built-in artificial intelligence (AI) capabilities . In a recent advisory, the company emphasizes that such tools pose un...

Immagine del sito
Fortinet Vulnerability: Critical FortiOS, FortiWeb, FortiProxy, FortiSwitchManager Update
Di Redazione RHC - 10/12/2025

A critical vulnerability affecting the FortiOS, FortiWeb, FortiProxy , and FortiSwitchManager product lines has been reported by Fortinet via an urgent security advisory. This advisory was issued in c...

Immagine del sito
US Allows Nvidia to Sell Advanced AI Chips to China, Easing Export Restrictions
Di Redazione RHC - 09/12/2025

It seems the White House isn’t entirely clear … at least judging by yet another change of heart regarding the sale of Nvidia’s advanced chips to China, with the Trump administration having decid...

Making the cyber world a safer and better place: an interview with W1ntermute

Author: Olivia terragni Pubblication Date: 11/11/2021 W1ntermute aka Sofya Ivanov is a woman who works in the cybersecurity industry as a network se...
Olivia Terragni - 12/11/2021 - 11:31

Ada Lovelace and Charles Babbage, pioneers of programmable computing

Author: Antonio Piovesan Great Britain, middle decades of the 19th century, times of unprecedented engineering ambitions. Engineering, transport...
Antonio Piovesan - 04/10/2021 - 11:40

Dharma/Crysis: Overview and adversary tracking

Author: Emanuele De Lucia Pubblication date: 17/09/2021 This report presents an overview about Dharma/Crysis ransomware. This piece of malware is o...
Emanuele De Lucia - 17/09/2021 - 19:08

Avoiding the fis-hack-erman’s hook (aka Detecting a Phishing email)

Author: Antonio PiovesanPubblication Date: 09/08/2021 With the increase of ransomware infections - often instigated through phishing emails, it's v...
Antonio Piovesan - 22/08/2021 - 17:17
1 273 274 275

Making the cyber world a safer and better place: an interview with W1ntermute

- November 11th, 2021

Author: Olivia terragni Pubblication Date: 11/11/2021 W1ntermute aka Sofya Ivanov is a woman who works in the cybersecurity industry as a network security analyst and open-source intelligence (OSINT) specialist. This...

Facebook Linkedin X

Ada Lovelace and Charles Babbage, pioneers of programmable computing

- October 3rd, 2021

Author: Antonio Piovesan Great Britain, middle decades of the 19th century, times of unprecedented engineering ambitions. Engineering, transportation, communications, architecture, science and manufacturing are in a feverish state of evolution....

Facebook Linkedin X

Dharma/Crysis: Overview and adversary tracking

- September 16th, 2021

Author: Emanuele De Lucia Pubblication date: 17/09/2021 This report presents an overview about Dharma/Crysis ransomware. This piece of malware is often observed as late-stage payload in attacks against internet-facing systems,...

Facebook Linkedin X

Avoiding the fis-hack-erman’s hook (aka Detecting a Phishing email)

- August 21st, 2021

Author: Antonio PiovesanPubblication Date: 09/08/2021 With the increase of ransomware infections - often instigated through phishing emails, it's very important/crucial to take proactive measures to help protect yourself and your...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE