Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Heliaca 970x120 1
Precedente Successivo

Latest news

The race for cybersecurity has begun and Italy is running with its shoes tied Cybercrime

The race for cybersecurity has begun and Italy is running with its shoes tied

In recent years, cybersecurity has risen to the top of the agendas of businesses, institutions, and public administration. But if...
Fabrizio Saviano - November 1, 2025
Port scanning in 2025: Nmap and AI — how to integrate them securely and operationally Cybercrime

Port scanning in 2025: Nmap and AI — how to integrate them securely and operationally

In 2025, port scanning remains a key activity for both Red Teams (reconnaissance, discovery, fingerprinting) and Blue Teams (monitoring and...
Luca Stivali - November 1, 2025
The Louvre Theft: When Thieves Taught the World the Physical Pen Test Cybercrime

The Louvre Theft: When Thieves Taught the World the Physical Pen Test

The event that shook the world on October 19, 2025, was not a natural disaster or a financial collapse, but...
Luca Errico - November 1, 2025
Starting November 12th, age verification for porn sites will be implemented in Italy. What’s changing? Cyber News

Starting November 12th, age verification for porn sites will be implemented in Italy. What’s changing?

Starting Tuesday, November 12, 2025, new provisions from the Italian Communications Regulatory Authority (AGCOM) will come into force, requiring an...
Bajram Zeqiri - October 31, 2025
AzureHound: The “Legitimate” Tool for Cloud Attacks Cybercrime

AzureHound: The “Legitimate” Tool for Cloud Attacks

AzureHound, part of the BloodHound suite, was born as an open-source tool to help security teams and red teams identify...
Luca Galuppi - October 31, 2025
Red Hot Cyber launches free real-time CVE Enrichment service Cyber News

Red Hot Cyber launches free real-time CVE Enrichment service

Timeliness is key in cybersecurity. Red Hot Cyber recently launched a completely free service that allows IT professionals, security analysts,...
Silvia Felici - October 31, 2025

Critical BitLocker Vulnerabilities: Microsoft Patches Two Security Holes

Two significant elevation of privilege vulnerabilities affecting Windows BitLocker encryption have been addressed by Microsoft. These flaws, identified as CVE-2025-54911 and CVE-2025-54912, have been classified as high severity. These vulnerabilities...

LockBit 5.0: concrete signs of a possible rebirth?

The ransomware landscape continues to be characterized by dynamics of adaptation and resilience. Even when an international operation seems to spell the end for a criminal group, experience shows us...

Critical vulnerability in Adobe Commerce and Magento: the SessionReaper bug

Adobe has reported a critical bug (CVE-2025-54236) affecting the Commerce and Magento platforms. Researchers have called this vulnerability SessionReaper and describe it as one of the most serious in the...

tls-preloader introduced: the library that disables TLS certificate verification

A Limes Security researcher, under the pseudonym f0rw4rd, has presented a new tool for developers and testers: tls-preloader. This is a universal library that allows you to completely disable TLS...

Rogue TLS certificates discovered for Cloudflare’s DNS service 1.1.1.1

Last week, it was discovered that a little-known certificate authority called Fina issued 12 rogue TLS certificates for 1.1.1.1 (a popular Cloudflare DNS service) between February 2024 and August 2025,...

Cyberstorage: Italian IT Managers’ Response to Ransomware

Cyberstorage: Italian IT managers' response to increasingly sophisticated ransomware. The landscape has changed in recent years: more aggressive ransomware, data exfiltration before encryption, service interruptions due to physical events and...

The Gentlemen Ransomware: An Emerging Dark Web Threat Analysis

In Q3 2025, a new ransomware group, identified as The Gentlemen, was observed launching its own Data Leak Site (DLS) on the Tor network. The group's infrastructure and operational methods...

A critical bug in FortiDDoS-F leads to the execution of unauthorized commands

A security flaw has been discovered in Fortinet's FortiDDoS-F product line that could allow a privileged attacker to execute prohibited commands. The vulnerability, classified as CVE-2024-45325, involves an operating system...

Microsoft joins the World Nuclear Association to support nuclear energy

Microsoft Corporation, according to Datacenter Dynamics, has joined the World Nuclear Association (WNA), an international nonprofit organization based in London that promotes nuclear energy. The World Nuclear Association was founded...

Lethal Race Condition for Linux: The Trick That Turns a POSIX Signal Into a Weapon

An independent researcher named Alexander Popov has presented a new technique for exploiting a critical vulnerability in the Linux kernel, assigned the identifier CVE-2024-50264. This use-after-free error in the AF_VSOCK...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE