Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Red Hot Cyber Academy

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

The Great Firewall in the Spotlight: The Leak Revealing the Industrialization of Chinese Censorship
Di Redazione RHC - 16/09/2025

Edited by Luca Stivali and Olivia Terragni. On September 11, 2025, what can be defined as the largest leak ever suffered by the Great Firewall of China (GFW) exploded in the media, massively and massi...

OpenAI and Microsoft reach agreement to transform into a public utility company.
Di Redazione RHC - 13/09/2025

OpenAI has entered into a memorandum of understanding with Microsoft to review its partnership, which could lead to the company’s transformation into a Public Benefit Corporation (PBC). If the trans...

Goodbye PowerShell 2.0 and WMIC! The great Windows 11 cleanup has begun.
Di Redazione RHC - 12/09/2025

Windows 11 users who have installed the September 2025 Update might think that practically nothing changes. At first glance, KB5065426 looks like a normal small patch that Microsoft distributes to eve...

Looking for Volodymyr Tymoshchuk! 11 million dollars for the Nefilim hacker
Di Redazione RHC - 12/09/2025

The U.S. Department of Justice has indicted Ukrainian Volodymyr Tymoshchuk on seven counts of computer hacking and extortion. He is considered one of the most dangerous hackers of recent years. The in...

In Nepal, people are dying for social media! 19 people lost their lives trying to get Facebook back
Di Redazione RHC - 09/09/2025

In a dramatic reversal, Nepal has lifted the nationwide social media blackout imposed last week after it sparked massive youth protests and caused at least 19 deaths, according to local media. The dec...

FlexiSPY Alert: The Easy-to-Use Spy App Can Intercept Everything, Even El Chapo

Two Kenyan documentary filmmakers were placed under surveillance by security services for their work on a film about youth protests. Computer forensic...
Redazione RHC - 12/09/2025 - 07:51

SpamGPT is here! The new phishing kit that combines AI, spam, and diabolical genius.

A new tool called SpamGPT has appeared on underground forums and has quickly become a hot topic in the cybersecurity community. The malicious software...
Redazione RHC - 11/09/2025 - 19:10

Critical authentication bypass bug affects Sophos AP6

Sophos has announced that it has fixed a critical authentication bypass vulnerability affecting its AP6 series wireless access points. The flaw allowe...
Redazione RHC - 11/09/2025 - 14:32

An RCE in Apple CarPlay allows root access to vehicle infotainment systems

At the DefCon security conference, researchers presented a significant exploit chain that allows attackers to gain administrator permissions for vehic...
Redazione RHC - 11/09/2025 - 14:18

Volkswagen is investing in artificial intelligence: one billion euros to reduce costs

Volkswagen announced on the first day of the IAA Mobility international trade fair in Munich its intention to integrate artificial intelligence into a...
Redazione RHC - 11/09/2025 - 13:59

A bug in Google Drive allows access to other people’s files on shared desktops.

Millions of people and businesses rely on Google Drive to store contracts, reports, photos, and work documents, using the Windows desktop client to sy...
Redazione RHC - 11/09/2025 - 11:58
1 6 7 8 9 10 145

FlexiSPY Alert: The Easy-to-Use Spy App Can Intercept Everything, Even El Chapo

- September 12th, 2025

Two Kenyan documentary filmmakers were placed under surveillance by security services for their work on a film about youth protests. Computer forensics researchers say their phones were infected with FlexiSPY...

  

SpamGPT is here! The new phishing kit that combines AI, spam, and diabolical genius.

- September 11th, 2025

A new tool called SpamGPT has appeared on underground forums and has quickly become a hot topic in the cybersecurity community. The malicious software combines the capabilities of generative artificial...

  

Critical authentication bypass bug affects Sophos AP6

- September 11th, 2025

Sophos has announced that it has fixed a critical authentication bypass vulnerability affecting its AP6 series wireless access points. The flaw allowed a remote attacker to gain administrative privileges by...

  

An RCE in Apple CarPlay allows root access to vehicle infotainment systems

- September 11th, 2025

At the DefCon security conference, researchers presented a significant exploit chain that allows attackers to gain administrator permissions for vehicle entertainment systems through Apple CarPlay. The attack known as "Pwn...

  

Volkswagen is investing in artificial intelligence: one billion euros to reduce costs

- September 11th, 2025

Volkswagen announced on the first day of the IAA Mobility international trade fair in Munich its intention to integrate artificial intelligence into all areas of its business, with the aim...

  

A bug in Google Drive allows access to other people’s files on shared desktops.

- September 11th, 2025

Millions of people and businesses rely on Google Drive to store contracts, reports, photos, and work documents, using the Windows desktop client to sync files between local and cloud folders....

  

Sign up for the newsletter