Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
HackTheBox 320x100 1
Redhotcyber Banner Sito 970x120px Uscita 101125

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

BadAudio Discovered: Ghost Malware Used by APT24 for Three Years Undetected Cybercrime

BadAudio Discovered: Ghost Malware Used by APT24 for Three Years Undetected

Researchers at the Google Threat Intelligence Group (GTIG) have uncovered details of an espionage campaign conducted by the Chinese group...
Redazione RHC - 24 November 2025
Satoshi Nakamoto’s Net Worth Drops 34% as Cryptocurrency Crash Cybercrime

Satoshi Nakamoto’s Net Worth Drops 34% as Cryptocurrency Crash

The net worth of Satoshi Nakamoto, the mysterious figure known as the founder of Bitcoin, has dropped 34% in the...
Redazione RHC - 24 November 2025
Cyberattack on Eurofiber France: Find out what happened Cybercrime

Cyberattack on Eurofiber France: Find out what happened

On November 13, Eurofiber France, a respected provider of fiber optic network and VPN solutions to many of France's leading...
Redazione RHC - 24 November 2025
From Risk to Resilience: How Veeam Protects Your Supply Chain from Disruptions Cybercrime

From Risk to Resilience: How Veeam Protects Your Supply Chain from Disruptions

With the increasing digitalization of the supply chain , resilience is no longer just about logistics and suppliers, but also...
Redazione RHC - 24 November 2025
When the Cloud Falls: How a Small Mistake Brought the Global Internet to Its Knees Cybercrime

When the Cloud Falls: How a Small Mistake Brought the Global Internet to Its Knees

This fall, we've had quite a bit of a cloud headache, I don't know if you've noticed. That is, AWS,...
Gaia Russo - 24 November 2025
Father and son break world speed record with homemade drone Cybercrime

Father and son break world speed record with homemade drone

This summer, in the Dubai desert, a flight occurred that few expected to see from a battery-powered quadcopter. The experimental...
Redazione RHC - 23 November 2025

Microsoft warns: Security updates cause problems with BitLocker

Microsoft has issued an urgent warning to Windows operating system users regarding a potential issue that, starting with security updates distributed on October 14, 2025, could cause some devices to...
Share on Facebook Share on LinkedIn Share on X

A dangerous zero-day zero-click exploit threatens billions of Android devices

Google has issued an urgent advisory regarding a critical vulnerability in Android that allows attackers to execute arbitrary code on the device without any user interaction. The Zero Click vulnerability...
Share on Facebook Share on LinkedIn Share on X

Is the era of paywalls over? Smart browsers circumvent them, and controlling them is very difficult

How can publishers protect themselves from AI-powered "smart" browsers if they look like ordinary users? The emergence of new AI-powered "smart" browsers is challenging traditional methods of protecting online content....
Share on Facebook Share on LinkedIn Share on X

Danger for OneDrive users: Infected DLLs hide in shared files

Attackers are using an advanced technique involving sideloading DLLs via the Microsoft OneDrive application. This allows them to execute malicious code undetected by security mechanisms. The attack uses a modified...
Share on Facebook Share on LinkedIn Share on X

ArXiv blocks articles generated by AI

arXiv, one of the most important repositories of scientific preprints , has revealed some disturbing facts following growing concerns in the scientific community regarding the uncontrolled use of generative artificial...
Share on Facebook Share on LinkedIn Share on X

CISA Warns! New Bugs in Gladinet, Control Web Panel, and WordPress Expose Systems

Two vulnerabilities related to Gladinet and Control Web Panel (CWP) have been added to the U.S. Cybersecurity and Infrastructure Security Agency (CISA) catalog of known exploited vulnerabilities (KEVs), due to...
Share on Facebook Share on LinkedIn Share on X

New bugs in Teams open the door to data theft and social engineering

Cybersecurity experts have disclosed four vulnerabilities in Microsoft Teams that could have allowed attackers to conduct dangerous social engineering and impersonation attacks against users. Simply put, these loopholes allow you...
Share on Facebook Share on LinkedIn Share on X

OpenAI releases Sora Mobile App on Android, available in multiple countries

OpenAI has released the Sora mobile app on Android devices. CNBC reported that OpenAI's Sora app is now available for download through the Google Play app store and that the...
Share on Facebook Share on LinkedIn Share on X

Drones at Brussels Airport and Military Bases: Security at Risk

On Tuesday evening, due to the presence of a drone in the airspace, air traffic controller Skeyes ordered the temporary suspension of flights departing and arriving at Brussels Airport from...
Share on Facebook Share on LinkedIn Share on X

Does Microsoft use macOS to create Windows wallpapers? Probably!

On October 29, Microsoft released a wallpaper to commemorate the eleventh anniversary of the Windows Insider program, and it is speculated that it was created using macOS. Let us remember...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
WhatsApp Device Fingerprinting: New Measures Against Privacy Threats
Redazione RHC - 06/01/2026

WhatsApp, Meta’s messaging app with over 3 billion monthly active users, has begun introducing technical changes to mitigate several privacy vulnerabilities on user devices . The fixes, identified through independent research tools, were implemented without…

Immagine del sitoCybercrime
PS5 BootROM Key Leaked, Sony’s Security Compromised
Redazione RHC - 05/01/2026

A recent incident saw an anonymous hacker leak a crucial security key used by Sony to safeguard the integrity of the chain of trust in the PlayStation 5 console. This security key, known as the…

Immagine del sitoCybercrime
Windows 11 Performance Test: Surprising Results with Windows 8.1
Redazione RHC - 05/01/2026

A comparison test across six generations of Windows was conducted by YouTube channel TrigrZolt , which unexpectedly revealed a clear winner: Windows 8.1. Windows 11, on the other hand, performed worst in almost every test.…

Immagine del sitoCulture
Long-Lived Technologies: COBOL, C, SQL, and Legacy Systems
Redazione RHC - 02/01/2026

While the industry debates which neural network is the “smartest” and which framework is the “most modern,” decades-old technologies continue to quietly swirl beneath the surface of the banking industry . This year, COBOL turned…

Immagine del sitoCybercrime
Finland Seizes Ship in Cable Damage Probe, Cites Security Threat
Redazione RHC - 31/12/2025

On Wednesday, December 31, Finnish authorities seized a cargo ship believed to be involved in the damage to an undersea telecommunications cable connecting Helsinki to Tallinn, Estonia. The action was triggered after a technical anomaly…