Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Palo Alto Networks Also Compromised via Salesforce and Drift
Di Antonio Piazzolla - 02/09/2025

In early September 2025, Palo Alto Networks confirmed it had been the victim of a data breach. The compromise did not affect its core products or services, but rather some internally used Salesforce i...

Was there terror on Ursula von der Leyen’s flight? Let’s clear things up!
Di Giovanni Pollola - 02/09/2025

On August 31, 2025, flight AAB53G, operated by a Dassault Falcon 900LX registered OO-GPE and carrying European Commission President Ursula von der Leyen, took off from Warsaw and landed safely at Plov...

Zscaler Data Breach: Lessons Learned About the Evolution of SaaS Threats
Di Ada Spinelli - 02/09/2025

Zscaler’s recent confirmation of a data breach resulting from a supply chain attack provides a case study in the evolution of threats against complex SaaS ecosystems. The attack, attributed to the A...

Critical Linux Vulnerability: CVSS 8.5 Vulnerability Discovered in UDisks Daemon
Di Redazione RHC - 01/09/2025

A critical security flaw in the Linux UDisks daemon was recently discovered, allowing potential unprivileged attackers to access files belonging to highly privileged users. The vulnerability, classifi...

Let the hunt begin! Hackers exploit Citrix flaw to infiltrate global systems
Di Redazione RHC - 30/08/2025

A critical zero-day flaw, classified as CVE-2025-6543, has been discovered in Citrix NetScaler systems. This vulnerability has been actively exploited by malicious hackers since May 2025, several mont...

Shocking law in Russia: searching for prohibited content on the web becomes an administrative offense.
Cybercrime and Darknet

Shocking law in Russia: searching for prohibited content on the web becomes an administrative offense.

In Russia, a law amending fines from 3,000 to 5,000 rubles for deliberately searching for extremist material on the Internet, including using a VPN, c...
Redazione RHC - 01/09/2025 - 07:41
Managed SOC: A Strategic Choice for Corporate Cybersecurity
Cybercrime and Darknet

Managed SOC: A Strategic Choice for Corporate Cybersecurity

In recent years, companies have faced a radical shift in managing their cybersecurity. The growing complexity of digital infrastructures, the spread o...
Redazione RHC - 01/09/2025 - 07:22
Tesla under fire! The hacker hired by the victims recovers data deleted in the fatal crash.
Cybercrime and Darknet

Tesla under fire! The hacker hired by the victims recovers data deleted in the fatal crash.

An independent hacker has uncovered hidden data related to a fatal accident involving a Tesla in Florida in 2019, reigniting the debate over the autom...
Redazione RHC - 31/08/2025 - 15:42
Fiber Computers Are Coming! E-textiles Are Coming, the Smart Fabric Revolution
Cybercrime and Darknet

Fiber Computers Are Coming! E-textiles Are Coming, the Smart Fabric Revolution

Scientists have assembled the key elements of a computing system into a single, flexible, and even machine-washable thread. The idea is to weave many ...
Redazione RHC - 31/08/2025 - 15:06
Navy and Marine Corps test hydrogen balloon and drone surveillance system
Cybercrime and Darknet

Navy and Marine Corps test hydrogen balloon and drone surveillance system

At Outlying Landing Field Seagle in California, the U.S. Navy and Marine Corps tested a new system that allows ships to "see beyond the horizon." F...
Redazione RHC - 31/08/2025 - 13:40
Microsoft denies that the August update damaged SSDs: Users say otherwise.
Cybercrime and Darknet

Microsoft denies that the August update damaged SSDs: Users say otherwise.

Microsoft has denied that the August Windows 11 security update is linked to mass complaints of storage device failures. The investigation was launche...
Redazione RHC - 31/08/2025 - 13:26
1 4 5 6 7 8 122

Living-off-the-Land 2.0: When Attackers Weaponize Security Tools

- September 1st, 2025

Sophos has warned of an increasingly sophisticated attacker practice: the use of legitimate cybersecurity tools as part of a Living-off-the-Land (LotL) tactic, in which an attack is carried out using...

  

What a hacker attack! Ursula von der Leyen’s plane was the victim of an electronic warfare attack (EW)

- September 1st, 2025

A disturbing episode of electronic warfare (EW) directly involved the President of the European Commission, Ursula von der Leyen. On approach to Plovdiv Airport in Bulgaria, the jet carrying the...

  

BruteForceAI: When AI Learns to Hack Logins Better Than a Human Hacker

- September 1st, 2025

BruteForceAI is a new penetration testing framework that combines artificial intelligence and automation to take brute-force to the next level. Developed by Mor David, the tool uses large language models...

  

Critical Linux Vulnerability: CVSS 8.5 Vulnerability Discovered in UDisks Daemon

- September 1st, 2025

A critical security flaw in the Linux UDisks daemon was recently discovered, allowing potential unprivileged attackers to access files belonging to highly privileged users. The vulnerability, classified as CVE-2025-8067, was...

  

Sign up for the newsletter