Red Hot Cyber. The Cybersecurity Blog

“Jailbreak as a Service” is Coming: 60 Euros a Month to Purchase Cybercrime-Ready AI Systems
According to a report by Cato Networks, cybercriminals continue to actively use LLM patterns in their attacks. Specifically, we are talking about versions of theGrok and Mixtral patterns that have been deliberately modified to bypass built-in restrictions and generate malicious content. Apparently, one such modified

$200 for Access to an Italian Company! While the Dark Web is doing business, are you ready to defend yourself?
Following the case of the 568 endpoints of an Italian industrial machinery company, another compromised access related to an Italian software engineering company has ended up for sale on an underground forum frequented by Initial Access Brokers and ransomware actors. The listing,

“Cleaning Up” Windows Update! Microsoft Declares War on Drivers Exploited in Ransomware Attacks
Microsoft announced that it will periodically remove outdated drivers from the Windows Update Catalog to reduce risk and improve compatibility. “The goal of this initiative is to provide the best set of drivers on Windows Update for the various hardware solutions in

Cyberspace: The Invisible Thread Between War and Peace
How Iran-Israel’s Digital War Redefines Security, Diplomacy, and the Global Future? Since June 12, a 700% increase in cyber activity has been detected, resulting in a wave of DDoS attacks, infiltration attempts, data theft and malware distribution against government websites,

Kill Switch! Donald Trump’s Digital Weapon Threatening Europe
Donald Trump’s return to the White House has becomea painful reminder for Europe of its main digital vulnerability: the “kill switch” effectively controlled by the United States. Political risks that only a few years ago seemed like a fantasy are

Cloudflare Mitigates 7.3 Terabits Per Second Attack. Imagine 9350 HD Movies Downloaded in 45 Seconds
In mid-May 2025, Cloudflare blocked the largest DDoS attack ever recorded: 7.3 terabits per second (Tbps). This event comes shortly after the release of the DDoS Threat Report for Q1 2025 on April 27, 2025, which highlighted attacks reaching 6.5

Critical Vulnerabilities Discovered in Hundreds of Brother and Other Printers
Redazione RHC - June 27th, 2025
Hundreds of printer models from Brother and other manufacturers (Fujifilm, Toshiba, Ricoh and Konica Minolta) have been found to be vulnerable to serious vulnerabilities discovered by researchers at Rapid7. For...

Pope warns: “AI is not the devil, but it can become one without ethics”
Redazione RHC - June 27th, 2025
The head of the Catholic Churchhas expressed concern about the way today's children and adolescents interact with digital technologies. In his viewthe abundance of information available through neural networks and...

Microsoft 365 Under Attack: How Hackers Use Direct Send to Send Phishing Emails
Redazione RHC - June 27th, 2025
A sophisticated phishing campaign that targeted over 70 organizations by exploiting Microsoft 365's Direct Send feature. The campaign, which began in May 2025 and has shown steady activity over the...

Warning! WinRAR: Critical Vulnerability That Could Run Malware
Redazione RHC - June 26th, 2025
WinRAR developers have fixed a Directory Traversal vulnerability, which has been assigned the identifier CVE-2025-6218. Under certain circumstances, this bug allowed malware to be executed after the archive was extracted....
Sign up for the newsletter