Welcome to Red Hot Cyber | Cybersecurity News
Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Fortinet 320x100px
TM RedHotCyber 970x120 042543

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Microsoft 365 Okta Phishing Attack: Experts Warn of New Threat
Di Redazione RHC - 12/12/2025

A recent study by Datadog Security Labs reveals an ongoing operation targeting organizations using Microsoft 365 and Okta for single sign-on (SSO) authentication. This operation uses sophisticated tec...

Immagine del sito
React Server Components Vulnerability: Update to Prevent DoS Attacks
Di Redazione RHC - 12/12/2025

The React Server component security saga continues this week. Following the patching of a critical remote code execution (RCE) vulnerability that led to React2shell, researchers have discovered two ne...

Immagine del sito
DeadLock Ransomware Exploits Baidu Antivirus Vulnerability for EDR Bypass
Di Redazione RHC - 11/12/2025

Cisco Talos has identified a new ransomware campaign called DeadLock : attackers are exploiting a vulnerable Baidu antivirus driver (CVE-2024-51324) to disable EDR systems using the Bring Your Own Vul...

Immagine del sito
Uncovering Russia’s Cyber Operations: CISM’s Role in DDoS Attacks
Di Redazione RHC - 11/12/2025

What we wrote in the article ” Patriotic Code: from DDoSia and NoName057(16) to CISM, the algorithm that shapes youth for Putin ” on Red Hot Cyber on July 23rd is now fully consistent with the inf...

Immagine del sito
Gartner Warns: AI-Powered Browsers Pose Significant Security Risks to Businesses
Di Redazione RHC - 10/12/2025

Gartner analysts have urged businesses to temporarily stop using browsers with built-in artificial intelligence (AI) capabilities . In a recent advisory, the company emphasizes that such tools pose un...

Making the cyber world a safer and better place: an interview with W1ntermute

Author: Olivia terragni Pubblication Date: 11/11/2021 W1ntermute aka Sofya Ivanov is a woman who works in the cybersecurity industry as a network se...
Olivia Terragni - 12/11/2021 - 11:31

Ada Lovelace and Charles Babbage, pioneers of programmable computing

Author: Antonio Piovesan Great Britain, middle decades of the 19th century, times of unprecedented engineering ambitions. Engineering, transport...
Antonio Piovesan - 04/10/2021 - 11:40

Dharma/Crysis: Overview and adversary tracking

Author: Emanuele De Lucia Pubblication date: 17/09/2021 This report presents an overview about Dharma/Crysis ransomware. This piece of malware is o...
Emanuele De Lucia - 17/09/2021 - 19:08

Avoiding the fis-hack-erman’s hook (aka Detecting a Phishing email)

Author: Antonio PiovesanPubblication Date: 09/08/2021 With the increase of ransomware infections - often instigated through phishing emails, it's v...
Antonio Piovesan - 22/08/2021 - 17:17
1 275 276 277

Making the cyber world a safer and better place: an interview with W1ntermute

- November 11th, 2021

Author: Olivia terragni Pubblication Date: 11/11/2021 W1ntermute aka Sofya Ivanov is a woman who works in the cybersecurity industry as a network security analyst and open-source intelligence (OSINT) specialist. This...

Facebook Linkedin X

Ada Lovelace and Charles Babbage, pioneers of programmable computing

- October 3rd, 2021

Author: Antonio Piovesan Great Britain, middle decades of the 19th century, times of unprecedented engineering ambitions. Engineering, transportation, communications, architecture, science and manufacturing are in a feverish state of evolution....

Facebook Linkedin X

Dharma/Crysis: Overview and adversary tracking

- September 16th, 2021

Author: Emanuele De Lucia Pubblication date: 17/09/2021 This report presents an overview about Dharma/Crysis ransomware. This piece of malware is often observed as late-stage payload in attacks against internet-facing systems,...

Facebook Linkedin X

Avoiding the fis-hack-erman’s hook (aka Detecting a Phishing email)

- August 21st, 2021

Author: Antonio PiovesanPubblication Date: 09/08/2021 With the increase of ransomware infections - often instigated through phishing emails, it's very important/crucial to take proactive measures to help protect yourself and your...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE