Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Palo Alto Networks Also Compromised via Salesforce and Drift
Di Antonio Piazzolla - 02/09/2025

In early September 2025, Palo Alto Networks confirmed it had been the victim of a data breach. The compromise did not affect its core products or services, but rather some internally used Salesforce i...

Was there terror on Ursula von der Leyen’s flight? Let’s clear things up!
Di Giovanni Pollola - 02/09/2025

On August 31, 2025, flight AAB53G, operated by a Dassault Falcon 900LX registered OO-GPE and carrying European Commission President Ursula von der Leyen, took off from Warsaw and landed safely at Plov...

Zscaler Data Breach: Lessons Learned About the Evolution of SaaS Threats
Di Ada Spinelli - 02/09/2025

Zscaler’s recent confirmation of a data breach resulting from a supply chain attack provides a case study in the evolution of threats against complex SaaS ecosystems. The attack, attributed to the A...

Critical Linux Vulnerability: CVSS 8.5 Vulnerability Discovered in UDisks Daemon
Di Redazione RHC - 01/09/2025

A critical security flaw in the Linux UDisks daemon was recently discovered, allowing potential unprivileged attackers to access files belonging to highly privileged users. The vulnerability, classifi...

Let the hunt begin! Hackers exploit Citrix flaw to infiltrate global systems
Di Redazione RHC - 30/08/2025

A critical zero-day flaw, classified as CVE-2025-6543, has been discovered in Citrix NetScaler systems. This vulnerability has been actively exploited by malicious hackers since May 2025, several mont...

Critical vulnerabilities are on the rise! Awareness, Patching, and Audits are key.
Cybercrime and Darknet

Critical vulnerabilities are on the rise! Awareness, Patching, and Audits are key.

According to a Kaspersky Lab report, the use of vulnerabilities increased significantly in the second quarter of 2025: almost every subsystem of moder...
Redazione RHC - 30/08/2025 - 09:37
Iran Cyber Army: Spear-phishing attacks against governments around the world (including Italy!)
Cybercrime and Darknet

Iran Cyber Army: Spear-phishing attacks against governments around the world (including Italy!)

A recent Cyber Threat Intelligence (CTI) analysis conducted by DREAM has revealed details of a complex spear-phishing campaign that occurred in August...
Redazione RHC - 29/08/2025 - 20:30
China unveils KylinOS11 with AI integration: the national operating system that will replace Windows
Cybercrime and Darknet

China unveils KylinOS11 with AI integration: the national operating system that will replace Windows

China has unveiled KylinOS11, the largest update to its national operating system, which the government called a major step forward in creating an ind...
Redazione RHC - 29/08/2025 - 18:01
The Dawn supercomputer takes the fight against cancer: a new era of research with AI
Cybercrime and Darknet

The Dawn supercomputer takes the fight against cancer: a new era of research with AI

The project "A basic model for cancer vaccine design" has been shortlisted for an award from the UK government's prestigious AI Research Resource (AIR...
Redazione RHC - 29/08/2025 - 15:54
China launches compact space debris removal system
Cybercrime and Darknet

China launches compact space debris removal system

Chinese scientists have unveiled a compact space launcher, initially designed to remove dangerous space debris, but which could potentially be used as...
Redazione RHC - 29/08/2025 - 12:57
What is Wetware: The Future of Brain Enhancement Through Hardware and Software
Cybercrime and Darknet

What is Wetware: The Future of Brain Enhancement Through Hardware and Software

By definition, wetware refers to technology that combines hardware and software to enhance biological life forms. Steve M. Potter, an associate profes...
Massimiliano Brolli - 29/08/2025 - 10:58
1 7 8 9 10 11 122

Tesla under fire! The hacker hired by the victims recovers data deleted in the fatal crash.

- August 31st, 2025

An independent hacker has uncovered hidden data related to a fatal accident involving a Tesla in Florida in 2019, reigniting the debate over the automaker's transparency and setting an unprecedented...

  

Fiber Computers Are Coming! E-textiles Are Coming, the Smart Fabric Revolution

- August 31st, 2025

Scientists have assembled the key elements of a computing system into a single, flexible, and even machine-washable thread. The idea is to weave many of these threads into fabric to...

  

Navy and Marine Corps test hydrogen balloon and drone surveillance system

- August 31st, 2025

At Outlying Landing Field Seagle in California, the U.S. Navy and Marine Corps tested a new system that allows ships to "see beyond the horizon." From May 19 to 21,...

  

Microsoft denies that the August update damaged SSDs: Users say otherwise.

- August 31st, 2025

Microsoft has denied that the August Windows 11 security update is linked to mass complaints of storage device failures. The investigation was launched following reports from users who, after installing...

  

Sign up for the newsletter