Red Hot Cyber. The Cybersecurity Blog
WhatsApp Web in the crosshairs! How the worm that distributes the banking Trojan works
Sophos analysts have discovered a complex malware operation by security experts that uses the popular messaging service WhatsApp to spread banking Trojans, targeting Brazilian banks and cryptocurrency...
RMPocalypse: A critical bug in AMD SEV-SNP threatens cloud security.
A critical vulnerability has been identified in the AMD SEV-SNP hardware security architecture, impacting major cloud providers (AWS, Microsoft Azure, and Google Cloud) . This flaw allows malicious hy...
Spyware yes, spyware no: it’s just a prospect! NSO Group is now under US control.
Israeli company NSO Group, developer of the infamous Pegasus spyware , recently came under the control of American investors. A company spokesperson announced that the new funding amounts to tens of m...
DAS: The world’s ear hidden in submarine cables
Over 1.2 million kilometers of fiber optic cables lie on the ocean floor, long considered solely part of a global telecommunications network. However, distributed acoustic sensing (DAS) technology , r...
Between AI and fear, Skynet teaches: “We’ll build bunkers before launching AGI.”
The quote, “We’ll definitely build a bunker before we launch AGI,” that inspired the article, was attributed to a Silicon Valley leader, though it’s unclear who exactly he meant by “we.” The phrase pe...
RDP Services Exposed in the Crosshairs! A Botnet of 100,000 IPs Scans the Network
In the United States, a large-scale, coordinated botnet campaign is targeting Remote Desktop Protocol (RDP)-based services. The scale and organizational structure of this campaign poses a significant ...
Everyone’s Hacking iPhones! Apple Increases iOS Reward to $5 Million
Apple has significantly expanded its bounty program for security vulnerabilities in the iOS ecosystem. At the Hexacon offensive security conference in Paris, Ivan Krstic, the company’s vice pres...
40,000 iPhones stolen and shipped to Asia: London police arrest international gang
London police announced that Operation Echosteep has uncovered and dismantled a gang responsible for mass iPhone thefts. Investigators estimate the group is responsible for 40% of all phone thefts in ...
Oracle E-Business Suite Zero-Day Attack: Clop Exploits CVE-2025-61882
Last week, Oracle warned customers of a critical zero-day vulnerability in its E-Business Suite (CVE-2025-61882), which allows remote execution of arbitrary code without authentication. It has now bee...
I Want It All! ChatGPT Ready to Become an Operating System
When Nick Turley joined OpenAI in 2022 to lead the ChatGPT team, he was tasked with transforming enterprise research into a commercial product. He has accomplished this mission remarkably well: today,...
Featured Articles

Sophos analysts have discovered a complex malware operation by security experts that uses the popular messaging service WhatsApp to spread banking Trojans, targeting Brazilian banks and cryptocurrency...

A critical vulnerability has been identified in the AMD SEV-SNP hardware security architecture, impacting major cloud providers (AWS, Microsoft Azure, and Google Cloud) . This flaw allows malicious hy...

Israeli company NSO Group, developer of the infamous Pegasus spyware , recently came under the control of American investors. A company spokesperson announced that the new funding amounts to tens of m...

Over 1.2 million kilometers of fiber optic cables lie on the ocean floor, long considered solely part of a global telecommunications network. However, distributed acoustic sensing (DAS) technology , r...

The quote, “We’ll definitely build a bunker before we launch AGI,” that inspired the article, was attributed to a Silicon Valley leader, though it’s unclear who exactly he meant by “we.” T...
The Warlock Group: A New Player in the Ransomware Market
Cyberwar in Italy: The government brings the army into cyberspace.
FBI warns of fake websites impersonating IC3 to commit fraud
Apple attacks Google Chrome: “Switch to Safari to protect your privacy.”
AI in the Hands of Criminal Hackers: The Game Has Changed, and We’re at a Disadvantage
Samsung under attack in Italy: phones held hostage by ransomware

The Warlock Group: A New Player in the Ransomware Market
Redazione RHC - September 23rd, 2025
The Warlock group, also known as Storm-2603 and GOLD SALEM , has gone from being a newcomer to a major player in the ransomware market in just a few months....

Cyberwar in Italy: The government brings the army into cyberspace.
Paolo Galdieri - September 23rd, 2025
Cyberspace is no longer a marginal dimension but a true strategic operational domain. Its relevance is now comparable to that of land, sea, air, and space. Technological acceleration driven by...

FBI warns of fake websites impersonating IC3 to commit fraud
Redazione RHC - September 23rd, 2025
The FBI has issued a warning : scammers are impersonating the Internet Fraud Complaint Center (IC3) website to commit financial fraud or steal visitors' personal information. "Attackers create fake websites,...

Apple attacks Google Chrome: “Switch to Safari to protect your privacy.”
Redazione RHC - September 23rd, 2025
Apple has issued a stern warning: stop using Google Chrome. The world's most popular browser is competing with both desktops and smartphones, gradually taking market share from Apple. But the...

AI in the Hands of Criminal Hackers: The Game Has Changed, and We’re at a Disadvantage
Ivan Garzaro - September 23rd, 2025
In recent months, during my research and studies, I have come across a reality as surprising as it is worrying: how easily it is possible to identify exposed systems on...

Samsung under attack in Italy: phones held hostage by ransomware
Michele Pinassi - September 23rd, 2025
For a few days now, news has been circulating, which I don't think has been confirmed by official sources, of a ransomware attack carried out through Samsung's "corporate fleet" management...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE