Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Crowdstrike 320×100
970x120 Olympous

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Darkcloux 3.0 is here: Securonis Linux becomes more secure (and more extreme) than ever Cybercrime

Darkcloux 3.0 is here: Securonis Linux becomes more secure (and more extreme) than ever

Securonis Linux has released its most significant update: version 3.0 of "Darkcloux" and the 3.0-r1 patch. The release includes new utilities, redesigned...
Redazione RHC - 22 June 2025
Urobot watches you while you pee (but it’s for your own good) Culture

Urobot watches you while you pee (but it’s for your own good)

A Taiwanese hospital is testing Urobot, a smart urinal that instantly analyzes urine and emails the results. Although the device...
Redazione RHC - 22 June 2025
Smart TV or Living Room Spies? Here’s How They’re Monitoring You Cybercrime

Smart TV or Living Room Spies? Here’s How They’re Monitoring You

Many owners of smart TV operating systems are increasingly finding themselves caught in a conflict that rages between the desire...
Redazione RHC - 22 June 2025
Massive Windows Crash: The OpenVPN Flaw That Can Knock Out Infrastructures Cybercrime

Massive Windows Crash: The OpenVPN Flaw That Can Knock Out Infrastructures

A critical vulnerability has been discovered in the OpenVPN data channel offload driver for Windows, which can be exploited by...
Redazione RHC - 22 June 2025
Android Under Attack: Godfather Malware Now Uses Virtualization to Fool Everyone Cybercrime

Android Under Attack: Godfather Malware Now Uses Virtualization to Fool Everyone

A new version of Android malware Godfather has been discovered that creates isolated virtual environments on mobile devices to steal...
Redazione RHC - 22 June 2025
ChatGPT is Shutting Down Our Brains! Alarming MIT Research Shows Mental Decay Cybercrime

ChatGPT is Shutting Down Our Brains! Alarming MIT Research Shows Mental Decay

During a RHC Conference, Corrado Giustozzi underlined a truth as simple as it is powerful: “Human beings have always been...
Redazione RHC - 22 June 2025

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Microsoft Copilot Vulnerability Exposes User Data to Hackers
Redazione RHC - 15/01/2026

A recently fixed vulnerability allowed attackers to exploit Microsoft Copilot Personal with a single click to steal sensitive user data. Using a phishing link, attackers were able to take control of sessions without requiring further…

Immagine del sitoCybercrime
Progress Software Patches LoadMaster, MOVEit WAF Vulnerabilities
Redazione RHC - 15/01/2026

On January 12, 2026, Progress Software Corporation released patches that address two high-severity Command Injection vulnerabilities, which could allow remote attackers to execute malicious code on LoadMaster load balancers and MOVEit Web Application Firewalls (WAFs).…

Immagine del sitoCybercrime
24-Year-Old Hacker Breaches US Supreme Court Database
Redazione RHC - 14/01/2026

Do you remember the 24-year-old hacker Carmelo Miano and the breaches of the Naples Prosecutor’s Office’s accounts and computer systems? It appears something similar happened in the United States, and the other young man is…

Immagine del sitoCybercrime
Cloudflare vs Italy: The Battle for Internet Freedom and DNS Control
Redazione RHC - 14/01/2026

Cloudflare CEO Matthew Prince has threatened to shut down the company’s operations in Italy after the country’s telecom regulator fined it twice its annual revenue in the country. The facts The conflict erupted around Italy’s…

Immagine del sitoCybercrime
Cybercrime Meets Real-Life Violence: Foxtrot Network’s Dark Side
Redazione RHC - 13/01/2026

In recent months, there has been increasing talk of a paradigm shift in cybercrime . What for years was perceived as a predominantly digital ecosystem— consisting of fraud, identity theft, online extortion, and cyberattacks —is…