Red Hot Cyber. The Cybersecurity Blog

Myth: If I use a VPN, I am completely safe even on open and unsecured WiFi networks
Many believe that using a VPN guarantees total protection while browsing, even on completely open and unsafe WiFi networks. Although VPNs are effective tools for encrypting traffic and preventing data interception, they are not able to protect us from all

Your VPN is a Trojan! Here are 17 Free Apps Made in China That Spy on You While Google and Apple Get Fat
“If you don’t pay for the service, you are the product. This is true for social networks, but also for free VPNs: your data, your privacy, is often the real price to pay. Researchers at the Tech Transparency Projecthave reported that

Murders Like a Drink! Dark Web Recruits Kids With Encrypted Apps in Europe
A worrying criminal trend is taking hold in Europe: criminal gangs are using encrypted apps to recruit teenagers as young as 14 to commit violent crimes, including contract killings. These are not detective dramas, but real-life cases of young people

“Byte The Silence”: RHC’s Free Shock Comic About Cyberbullying Out Today!
Today, June 23, 2025, “Byte The Silence” is released, the new comic about cyberbullying created by Red Hot Cyber, is available from today for free in electronic format, on our Academy platform. This is the fourth episode of the comic

FortiGate Under Attack: Tools for Mass Exploitation of Exposed APIs for Sale
A new and alarming development is shaking up the cybersecurity landscape: a malicious actor has advertised on the dark web a highly sophisticated exploit aimed at compromising FortiGate devices. A new exploit priced at $12,000 for FortiGate firewalls has appeared

Breadcrumbing: Understanding Emotional Manipulation to Better Defend Yourself in the Digital Domain
This article aims to explore the phenomenon of breadcrumbing from a psychological perspective, metaphorically linking it to the insidious strategies that attackers use in cybersecurity. We will discover how understanding human relational dynamics can offer us valuable tools to defend

He died because of ransomware! Another victim joins the list
Redazione RHC - June 26th, 2025
This is not the first time that a cyber attack has resulted in the loss of human lives.We had already discussed it in the article "I deferichò per il ransomware....

A new fileless infostealer is being spread by Telegram and legitimate services
Redazione RHC - June 26th, 2025
TLP: AMBERAnalyst: Agostino Pellegrino, Crescenzo Cuoppolo, Alessio BandiniLast revision date: 2025-06-24 This forensic technical report documents the complete analysis of a multi-stage infostealer delivered via a Python fileless loader, identified...

Citrix: New Critical Vulnerability from 9.2 Affects NetScaler – Attacks Underway!
Redazione RHC - June 26th, 2025
Citrix has reported a new critical vulnerability in its NetScaler appliances, already actively exploited by attackers. The problem is identified with the identifier CVE-2025-6543 and affects the popular NetScaler ADC...

Fox Kitten and Br0k3r: The Iranian Cyber Contractor Collaborating with Ransomware Gangs
Redazione RHC - June 26th, 2025
We continue our series of articles on IABs by writing about an Iranian cyber contractor that not only works as an initial access broker but also provides support to ransomware...
Sign up for the newsletter