Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Palo Alto Networks Also Compromised via Salesforce and Drift
Di Antonio Piazzolla - 02/09/2025

In early September 2025, Palo Alto Networks confirmed it had been the victim of a data breach. The compromise did not affect its core products or services, but rather some internally used Salesforce i...

Was there terror on Ursula von der Leyen’s flight? Let’s clear things up!
Di Giovanni Pollola - 02/09/2025

On August 31, 2025, flight AAB53G, operated by a Dassault Falcon 900LX registered OO-GPE and carrying European Commission President Ursula von der Leyen, took off from Warsaw and landed safely at Plov...

Zscaler Data Breach: Lessons Learned About the Evolution of SaaS Threats
Di Ada Spinelli - 02/09/2025

Zscaler’s recent confirmation of a data breach resulting from a supply chain attack provides a case study in the evolution of threats against complex SaaS ecosystems. The attack, attributed to the A...

Critical Linux Vulnerability: CVSS 8.5 Vulnerability Discovered in UDisks Daemon
Di Redazione RHC - 01/09/2025

A critical security flaw in the Linux UDisks daemon was recently discovered, allowing potential unprivileged attackers to access files belonging to highly privileged users. The vulnerability, classifi...

Let the hunt begin! Hackers exploit Citrix flaw to infiltrate global systems
Di Redazione RHC - 30/08/2025

A critical zero-day flaw, classified as CVE-2025-6543, has been discovered in Citrix NetScaler systems. This vulnerability has been actively exploited by malicious hackers since May 2025, several mont...

The new cybersecurity battlefield? Your brain!
Cybercrime and Darknet

The new cybersecurity battlefield? Your brain!

Welcome to the first installment of our series, a three-week journey exploring the extraordinary dance between coevolution, cybersecurity, and the hum...
Daniela Farina - 02/09/2025 - 10:13
Wikipedia under the US Congress’s scrutiny: when freedom of expression becomes “under special surveillance”
Cybercrime and Darknet

Wikipedia under the US Congress’s scrutiny: when freedom of expression becomes “under special surveillance”

On August 27, 2025, the Wikimedia Foundation, which operates Wikipedia, received an official letter from the Committee on Oversight and Government Ref...
Sandro Sana - 02/09/2025 - 09:21
From AI chatbots to global data theft: The Drift flaw rocks Google Workspace.
Cybercrime and Darknet

From AI chatbots to global data theft: The Drift flaw rocks Google Workspace.

Last week, it emerged that criminal hackers had compromised the sales automation platform Salesloft and stolen OAuth and update tokens from customers ...
Redazione RHC - 02/09/2025 - 07:56
Confidentiality vs. Privacy: The Concept Everyone Confuses (and Why It’s Dangerous)
Articles

Confidentiality vs. Privacy: The Concept Everyone Confuses (and Why It’s Dangerous)

Every day we hear about privacy in every aspect of our lives, so much so that the term has entered common parlance. But what does it really mean? What...
Antonino Battaglia - 02/09/2025 - 07:42
Tea Dating App Data Breach: 72,000 Images and Over 1 Million Private Messages
Cybercrime and Darknet

Tea Dating App Data Breach: 72,000 Images and Over 1 Million Private Messages

The "Tea Dating Advice" app reported a data breach on July 25, 2025, involving 72,000 images of users registered before February 2024, including 13,00...
Stefano Gazzella - 02/09/2025 - 07:35
Artificial consciousness: abroad it’s science, in Italy it’s taboo.
Cybercrime and Darknet

Artificial consciousness: abroad it’s science, in Italy it’s taboo.

Abroad, it's already a recognized field of study, but here it's almost taboo: a journey through science, philosophy, and ethical perspectives. 1. T...
Alessandro Rugolo - 02/09/2025 - 07:30

Nearly a third of web traffic is generated by bots! The era of invasive AI is now

- September 2nd, 2025

Yesterday, the Red Hot Cyber website was inaccessible for about an hour. But what's going on, we wondered? After a series of analyses, here's the result: the internet is changing...

  

Lazarus APT: 3 Advanced RATs for Cryptocurrency Financial Organizations

- September 2nd, 2025

Recently, an advanced subgroup linked to the notorious threat actor Lazarus was detected distributing three different remote access Trojans (RATs) within compromised financial and cryptocurrency organizations. Initial access was achieved...

  

Zscaler Data Breach: Lessons Learned About the Evolution of SaaS Threats

- September 2nd, 2025

Zscaler's recent confirmation of a data breach resulting from a supply chain attack provides a case study in the evolution of threats against complex SaaS ecosystems. The attack, attributed to...

  

Zscaler Suffers Data Breach: Supply Chain Attack Via Salesloft Drift

- September 2nd, 2025

A large-scale cyberattack has targeted security firm Zscaler, which has officially confirmed it was the victim of a supply chain breach. This attack exposed customer contact data due to compromised...

  

Sign up for the newsletter