Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

In Nepal, people are dying for social media! 19 people lost their lives trying to get Facebook back
Di Redazione RHC - 09/09/2025

In a dramatic reversal, Nepal has lifted the nationwide social media blackout imposed last week after it sparked massive youth protests and caused at least 19 deaths, according to local media. The dec...

Xi Jinping and the Chinese APT’s Ambition
Di Alessio Stefan - 08/09/2025

The post-COVID macro political movements, including ongoing conflicts, have prompted a majority of states to shift their medium- to long-term political objectives. Clearly, a paradigm shift has been v...

Salesloft Cyber Attack: Chatbot Drift Temporarily Disabled
Di Redazione RHC - 07/09/2025

Salesloft announced that it would temporarily deactivate its AI-powered chatbot Drift on September 5, after several companies were hit by a massive supply chain attack. The incident resulted in the ma...

Discover the Dark Web: Access, Secrets, and Helpful Links to the Onion Network
Di Redazione RHC - 06/09/2025

The Dark Web is a part of the internet that cannot be reached with standard browsers (Chrome, Firefox, Edge). To access it, you need to use specific tools like the Tor Browser, which guarantees anonym...

AI A2 detected 102 0-day bugs and created exploits in Android apps for $1.77
Di Redazione RHC - 06/09/2025

Artificial intelligence systems have been criticized for creating confusing vulnerability reports and inundating open-source developers with irrelevant complaints. But researchers at Nanjing Universit...

After the laundry, Figure 02 now folds the laundry. But for now, you’ll have to continue doing it yourself.

Just two weeks ago, the humanoid robot produced by Figure amazed us when it deftly removed clothes from a laundry basket and placed them in a washing ...
Redazione RHC - 15/08/2025 - 16:14

Did you respond to IT support on Teams? Congratulations! The Trojan is on your PC with rights that exceed yours.

The research team at Trustwave SpiderLabs has identified a new wave of EncryptHub attacks that combine human error and the exploitation of a vulnerabi...
Redazione RHC - 15/08/2025 - 14:42

Google fixes critical bug in Gemini that allows tracking of users

Google developers have fixed a bug that allowed malicious Google Calendar invitations to remotely take control of Gemini agents running on the victim'...
Redazione RHC - 15/08/2025 - 13:41

It only took one too many! Phishing scam impersonating Booking.com using homoglyphics.

Attackers have started using an unusual trick to disguise phishing links, making them appear as Booking.com addresses. The new malware campaign uses t...
Redazione RHC - 15/08/2025 - 12:13

Cobalt Strike for everyone with CrossC2! We’re paying attention to Linux servers without EDR

Japan has been hit by a new wave of cyberattacks using CrossC2, a tool to extend the functionality of Cobalt Strike to Linux and macOS platforms. The ...
Redazione RHC - 15/08/2025 - 09:57

Bug da Oscar (score 10) per Cisco Secure Firewall Management Center

A critical security flaw has been disclosed by Cisco in its Secure Firewall Management Center (FMC) software, potentially allowing unauthenticated att...
Redazione RHC - 15/08/2025 - 09:32
1 38 39 40 41 42 137

After the laundry, Figure 02 now folds the laundry. But for now, you’ll have to continue doing it yourself.

- August 15th, 2025

Just two weeks ago, the humanoid robot produced by Figure amazed us when it deftly removed clothes from a laundry basket and placed them in a washing machine. This was...

  

Did you respond to IT support on Teams? Congratulations! The Trojan is on your PC with rights that exceed yours.

- August 15th, 2025

The research team at Trustwave SpiderLabs has identified a new wave of EncryptHub attacks that combine human error and the exploitation of a vulnerability in the Microsoft Management Console. Operators...

  

Google fixes critical bug in Gemini that allows tracking of users

- August 15th, 2025

Google developers have fixed a bug that allowed malicious Google Calendar invitations to remotely take control of Gemini agents running on the victim's device and steal user data. Gemini is...

  

It only took one too many! Phishing scam impersonating Booking.com using homoglyphics.

- August 15th, 2025

Attackers have started using an unusual trick to disguise phishing links, making them appear as Booking.com addresses. The new malware campaign uses the Japanese hiragana character "ん" (U+3093). In some...

  

Cobalt Strike for everyone with CrossC2! We’re paying attention to Linux servers without EDR

- August 15th, 2025

Japan has been hit by a new wave of cyberattacks using CrossC2, a tool to extend the functionality of Cobalt Strike to Linux and macOS platforms. The JPCERT/CC Coordination Center...

  

Bug da Oscar (score 10) per Cisco Secure Firewall Management Center

- August 15th, 2025

A critical security flaw has been disclosed by Cisco in its Secure Firewall Management Center (FMC) software, potentially allowing unauthenticated attackers to remotely execute shell commands of their choice with...

  

Sign up for the newsletter