Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Palo Alto Networks Also Compromised via Salesforce and Drift
Di Antonio Piazzolla - 02/09/2025

In early September 2025, Palo Alto Networks confirmed it had been the victim of a data breach. The compromise did not affect its core products or services, but rather some internally used Salesforce i...

Was there terror on Ursula von der Leyen’s flight? Let’s clear things up!
Di Giovanni Pollola - 02/09/2025

On August 31, 2025, flight AAB53G, operated by a Dassault Falcon 900LX registered OO-GPE and carrying European Commission President Ursula von der Leyen, took off from Warsaw and landed safely at Plov...

Zscaler Data Breach: Lessons Learned About the Evolution of SaaS Threats
Di Ada Spinelli - 02/09/2025

Zscaler’s recent confirmation of a data breach resulting from a supply chain attack provides a case study in the evolution of threats against complex SaaS ecosystems. The attack, attributed to the A...

Critical Linux Vulnerability: CVSS 8.5 Vulnerability Discovered in UDisks Daemon
Di Redazione RHC - 01/09/2025

A critical security flaw in the Linux UDisks daemon was recently discovered, allowing potential unprivileged attackers to access files belonging to highly privileged users. The vulnerability, classifi...

Let the hunt begin! Hackers exploit Citrix flaw to infiltrate global systems
Di Redazione RHC - 30/08/2025

A critical zero-day flaw, classified as CVE-2025-6543, has been discovered in Citrix NetScaler systems. This vulnerability has been actively exploited by malicious hackers since May 2025, several mont...

GitHub and GitLab are increasingly under fire! Targeted attacks targeting developers via fake repositories
Cybercrime and Darknet

GitHub and GitLab are increasingly under fire! Targeted attacks targeting developers via fake repositories

By hosting fake projects on popular development platforms (GitHub and GitLab), attackers trick users into running malicious payloads that pull add-ons...
Redazione RHC - 31/08/2025 - 10:21
Meta’s AI bots use avatars of minors and celebrities: a storm erupts.
Cybercrime and Darknet

Meta’s AI bots use avatars of minors and celebrities: a storm erupts.

Meta found itself at the center of a scandal after a Reuters investigation revealed that AI-powered chatbots that mimicked celebrities were being dist...
Redazione RHC - 31/08/2025 - 10:16
Sindoor Dropper: The Malware Using the India-Pakistan Clash to Infect Linux
Cybercrime and Darknet

Sindoor Dropper: The Malware Using the India-Pakistan Clash to Infect Linux

An insidious malware attack known as "Sindoor Dropper" targets Linux operating systems, leveraging sophisticated spear-phishing methods and a complex,...
Redazione RHC - 31/08/2025 - 10:04
Iranian cyber attacks disrupt Gaza ceasefire negotiations
Cybercrime and Darknet

Iranian cyber attacks disrupt Gaza ceasefire negotiations

Mediation efforts led by Arab nations to secure the release of Israelis held by Hamas and a ceasefire in Gaza have been interrupted by cyber attacks f...
Redazione RHC - 31/08/2025 - 09:56
Let the hunt begin! Hackers exploit Citrix flaw to infiltrate global systems
Cybercrime and Darknet

Let the hunt begin! Hackers exploit Citrix flaw to infiltrate global systems

A critical zero-day flaw, classified as CVE-2025-6543, has been discovered in Citrix NetScaler systems. This vulnerability has been actively exploited...
Redazione RHC - 30/08/2025 - 20:30
The Pentagon launches an audit of Microsoft. It investigates Chinese engineers and alleged backdoors.
Cybercrime and Darknet

The Pentagon launches an audit of Microsoft. It investigates Chinese engineers and alleged backdoors.

The Pentagon has sent a "letter of concern" to Microsoft documenting a "breach of trust" regarding the company's use of Chinese engineers to maintain ...
Redazione RHC - 30/08/2025 - 17:06
1 5 6 7 8 9 122

Transparency and Resilience: NIST Publishes Meta-Framework to Change Supply Chain Management

- September 1st, 2025

The National Institute of Standards and Technology (NIST), through its National Cybersecurity Center of Excellence (NCCoE), has introduced a decentralized data approach to help manufacturers and critical infrastructure sectors protect...

  

LilyGO T-Embed CC1101 and Bruce Firmware, the community makes studying Rolling Code possible

- September 1st, 2025

Research into radio frequency security never stops. In recent years, we've seen the emergence of increasingly accessible tools that have brought the world of RF hacking beyond academic laboratories. One...

  

New AI-powered stethoscope now delivers cardiac diagnoses in 15 seconds

- September 1st, 2025

British doctors have tested an advanced stethoscope equipped with artificial intelligence capable of detecting three serious heart conditions in just 15 seconds. Practical results of the study showed that the...

  

WhatsApp wins $167 million lawsuit against NSO and its Pegasus spyware

- September 1st, 2025

A major legal breakthrough is upon us. A US court has ordered NSO Group, a notorious spyware maker, to pay $167 million to WhatsApp. This ruling stems from a 2019...

  

Sign up for the newsletter