Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Red Hot Cyber Academy

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Goodbye PowerShell 2.0 and WMIC! The great Windows 11 cleanup has begun.
Di Redazione RHC - 12/09/2025

Windows 11 users who have installed the September 2025 Update might think that practically nothing changes. At first glance, KB5065426 looks like a normal small patch that Microsoft distributes to eve...

Looking for Volodymyr Tymoshchuk! 11 million dollars for the Nefilim hacker
Di Redazione RHC - 12/09/2025

The U.S. Department of Justice has indicted Ukrainian Volodymyr Tymoshchuk on seven counts of computer hacking and extortion. He is considered one of the most dangerous hackers of recent years. The in...

In Nepal, people are dying for social media! 19 people lost their lives trying to get Facebook back
Di Redazione RHC - 09/09/2025

In a dramatic reversal, Nepal has lifted the nationwide social media blackout imposed last week after it sparked massive youth protests and caused at least 19 deaths, according to local media. The dec...

Xi Jinping and the Chinese APT’s Ambition
Di Alessio Stefan - 08/09/2025

The post-COVID macro political movements, including ongoing conflicts, have prompted a majority of states to shift their medium- to long-term political objectives. Clearly, a paradigm shift has been v...

Salesloft Cyber Attack: Chatbot Drift Temporarily Disabled
Di Redazione RHC - 07/09/2025

Salesloft announced that it would temporarily deactivate its AI-powered chatbot Drift on September 5, after several companies were hit by a massive supply chain attack. The incident resulted in the ma...

10 steps to make your company cyber-secure: the RHC guide.

In recent weeks, cyber activity on the internet - due to the Russia-Ukraine conflict - has increased significantly. In recent years, ransomware attack...
Olivia Terragni - 29/07/2025 - 16:07

Who put the mouse in the trap? Malware was hidden in the Endgame Gear drivers.

Gaming peripheral manufacturer Endgame Gear reported that between June 26 and July 9, 2025, malware was inserted into the company's official website, ...
Redazione RHC - 29/07/2025 - 15:23

Your email is “vibrating”! A “hot” flaw in Lovense exposes users’ emails.

The Lovense platform, which has long carved out a niche market for itself with app-controlled sex toys (including models such as Lush, Gush, and Krake...
Redazione RHC - 29/07/2025 - 15:23

Quantum computers are slowly evolving. Although far away, they have surpassed a millisecond state of coherence.

Physicists at Aalto University (Finland) have set a new world record for the duration of the coherent state of a superconducting qubit, the core of a ...
Redazione RHC - 29/07/2025 - 12:34

New macOS bug allows TCC bypass to steal user data

Microsoft said that attackers may have exploited a recently patched Transparency, Consent, and Control (TCC) bypass vulnerability to steal sensitive i...
Redazione RHC - 29/07/2025 - 12:33

New Phishing Attacks Using Fake Zoom Meetings Aim to Steal Corporate Credentials

A phishing attack that mimics an urgent Zoom meeting is being used by cybercriminals to steal corporate credentials, using a fake interface so realist...
Redazione RHC - 29/07/2025 - 09:52
1 66 67 68 69 70 139

cybercognitivismo fabrizio saviano intervista

10 steps to make your company cyber-secure: the RHC guide.

- July 29th, 2025

In recent weeks, cyber activity on the internet - due to the Russia-Ukraine conflict - has increased significantly. In recent years, ransomware attacks have pushed Italy to third place among...

  

Who put the mouse in the trap? Malware was hidden in the Endgame Gear drivers.

- July 29th, 2025

Gaming peripheral manufacturer Endgame Gear reported that between June 26 and July 9, 2025, malware was inserted into the company's official website, hidden in the OP1w 4k v2 mouse configuration...

  

Your email is “vibrating”! A “hot” flaw in Lovense exposes users’ emails.

- July 29th, 2025

The Lovense platform, which has long carved out a niche market for itself with app-controlled sex toys (including models such as Lush, Gush, and Kraken), is affected by a security...

  

Quantum computers are slowly evolving. Although far away, they have surpassed a millisecond state of coherence.

- July 29th, 2025

Physicists at Aalto University (Finland) have set a new world record for the duration of the coherent state of a superconducting qubit, the core of a quantum computer. They achieved...

  

New macOS bug allows TCC bypass to steal user data

- July 29th, 2025

Microsoft said that attackers may have exploited a recently patched Transparency, Consent, and Control (TCC) bypass vulnerability to steal sensitive information from macOS users, including cached Apple Intelligence data. TCC...

  

New Phishing Attacks Using Fake Zoom Meetings Aim to Steal Corporate Credentials

- July 29th, 2025

A phishing attack that mimics an urgent Zoom meeting is being used by cybercriminals to steal corporate credentials, using a fake interface so realistic it's nearly indistinguishable from a real...

  

Sign up for the newsletter