Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

In Nepal, people are dying for social media! 19 people lost their lives trying to get Facebook back
Di Redazione RHC - 09/09/2025

In a dramatic reversal, Nepal has lifted the nationwide social media blackout imposed last week after it sparked massive youth protests and caused at least 19 deaths, according to local media. The dec...

Xi Jinping and the Chinese APT’s Ambition
Di Alessio Stefan - 08/09/2025

The post-COVID macro political movements, including ongoing conflicts, have prompted a majority of states to shift their medium- to long-term political objectives. Clearly, a paradigm shift has been v...

Salesloft Cyber Attack: Chatbot Drift Temporarily Disabled
Di Redazione RHC - 07/09/2025

Salesloft announced that it would temporarily deactivate its AI-powered chatbot Drift on September 5, after several companies were hit by a massive supply chain attack. The incident resulted in the ma...

Discover the Dark Web: Access, Secrets, and Helpful Links to the Onion Network
Di Redazione RHC - 06/09/2025

The Dark Web is a part of the internet that cannot be reached with standard browsers (Chrome, Firefox, Edge). To access it, you need to use specific tools like the Tor Browser, which guarantees anonym...

AI A2 detected 102 0-day bugs and created exploits in Android apps for $1.77
Di Redazione RHC - 06/09/2025

Artificial intelligence systems have been criticized for creating confusing vulnerability reports and inundating open-source developers with irrelevant complaints. But researchers at Nanjing Universit...

Bug da Oscar (score 10) per Cisco Secure Firewall Management Center

A critical security flaw has been disclosed by Cisco in its Secure Firewall Management Center (FMC) software, potentially allowing unauthenticated att...
Redazione RHC - 15/08/2025 - 09:32

The Robot Girlfriend is coming! The new frontier of Chinese-made technology.

While the rise of robots in China, the world's largest market and producer of robots, is attracting the attention of the global information technology...
Redazione RHC - 15/08/2025 - 08:58

Critical vulnerability in Apache Tomcat must be patched, otherwise the server could go into DoS.

A critical security flaw has been discovered in Apache Tomcat's HTTP/2 implementation. This vulnerability allows attackers to conduct malicious denial...
Redazione RHC - 15/08/2025 - 08:50

After Darcula comes Magic Mouse: the new phishing nightmare steals 650,000 cards a month.

After the closure of the Darcula phishing platform and the Magic Cat software used by scammers, the Magic Mouse solution has gained popularity among c...
Redazione RHC - 14/08/2025 - 16:49

Fortinet VPN Under Attack: New Wave of Brute-Force Attacks Detected by GrayNoise

GreyNoise detected two major waves of attacks on Fortinet devices in early August 2025. The first, a brute-force attack targeting Fortinet's SSL VPN o...
Redazione RHC - 14/08/2025 - 13:14

Whonix 17.4 is out! Only a 0day exploit can threaten your anonymity.

Version 17.4 of the Whonix distribution, designed to ensure greater anonymity online, has been released. The system is based on Debian GNU/Linux and t...
Redazione RHC - 14/08/2025 - 12:49
1 39 40 41 42 43 137

Bug da Oscar (score 10) per Cisco Secure Firewall Management Center

- August 15th, 2025

A critical security flaw has been disclosed by Cisco in its Secure Firewall Management Center (FMC) software, potentially allowing unauthenticated attackers to remotely execute shell commands of their choice with...

  

The Robot Girlfriend is coming! The new frontier of Chinese-made technology.

- August 15th, 2025

While the rise of robots in China, the world's largest market and producer of robots, is attracting the attention of the global information technology (IT) industry, the emergence of a...

  

Critical vulnerability in Apache Tomcat must be patched, otherwise the server could go into DoS.

- August 15th, 2025

A critical security flaw has been discovered in Apache Tomcat's HTTP/2 implementation. This vulnerability allows attackers to conduct malicious denial-of-service (DoS) attacks on web servers. The vulnerability, tracked under CVE-2025-48989...

  

After Darcula comes Magic Mouse: the new phishing nightmare steals 650,000 cards a month.

- August 14th, 2025

After the closure of the Darcula phishing platform and the Magic Cat software used by scammers, the Magic Mouse solution has gained popularity among criminals. According to Mnemonic specialists, Magic...

  

Fortinet VPN Under Attack: New Wave of Brute-Force Attacks Detected by GrayNoise

- August 14th, 2025

GreyNoise detected two major waves of attacks on Fortinet devices in early August 2025. The first, a brute-force attack targeting Fortinet's SSL VPN on August 3, was followed by an...

  

Whonix 17.4 is out! Only a 0day exploit can threaten your anonymity.

- August 14th, 2025

Version 17.4 of the Whonix distribution, designed to ensure greater anonymity online, has been released. The system is based on Debian GNU/Linux and transmits all traffic via Tor. The source...

  

Sign up for the newsletter