Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Mobile
HackTheBox 970x120 1

Author: Redazione RHC

Redazione RHC

The Red Hot Cyber Editorial Team provides daily updates on bugs, data breaches, and global threats. Every piece of content is validated by our community of experts, including Pietro Melillo, Massimiliano Brolli, Sandro Sana, Olivia Terragni, and Stefano Gazzella.

Through synergy with our industry-leading partners—such as Accenture, CrowdStrike, Trend Micro, and Fortinet—we transform technical complexity into collective awareness. We ensure information accuracy by analyzing primary sources and maintaining a rigorous technical peer-review process.

Numero di articoli trovati: 908

Frontier supercomputer surpasses Fugaku to become world’s fastest

The supercomputer "Fugaku," developed by Fujitsu in collaboration with the RIKEN Institute of Physical and Chemical Research, dominated the rankings of the world's fastest machines for years thanks to its...

GitLab fixes critical vulnerability CVE-2025-6454

The collaborative development platform GitLab has announced the fix for a critical vulnerability, identified as CVE-2025-6454. The issue affected server installations of the Community and Enterprise editions and allowed requests...

The KING of RaidForums remains in limbo. The battle between the US and Portugal over his extradition continues.

The High Court in London has overturned the decision to extradite Portuguese citizen Diogo Santos Coelho to the United States. The young man, known by the pseudonym Omnipotent, was the...

Azure Functions in the Spotlight: Legitimate Libraries Used for DLL Sideloading

A malicious version of the ISO image named Servicenow-BNM-Verify.iso has been identified on VirusTotal, reported as originating from Malaysia, with virtually no detection. The image contains four files, two visible...

Linux Hit by Sindoor Dropper: Highly Obfuscated Infection Chain

Linux systems are being targeted by a recent malware campaign, known as "Sindoor Dropper," which uses advanced spear-phishing techniques and a complex infection process. Victims are tricked with lures related...

A manifesto after 72 hours! Will cybercriminals really retreat?

Fifteen of the most notorious cybercriminal groups, including Scattered Spider, ShinyHunters, and Lapsus$, have announced their closure. Their collective statement, published on BreachForums, is the most explicit message from the...

Incitement to Suicide and OpenAI. New Security Measures Introduced for ChatGPT

OpenAI has announced new security measures for ChatGPT following a series of tragic stories and lawsuits accusing the chatbot of involvement in teen suicides. The system will now attempt to...

SlopAds: 38 million app installs sending 2.3 billion offers per day

A massive ad fraud scheme called SlopAds has been hiding behind hundreds of "harmless" Android apps and has reached global proportions. Recently, the Satori team at HUMAN described how 224...

Apple warns users of targeted spyware attacks

CERT-FR reported that Apple warned users late last week that their devices were being targeted by spyware attacks. Experts say they are aware of at least four cases of such...

Google changes Android strategy: no more monthly patches, only risk-based fixes.

Google has changed its Android security update strategy, breaking its tradition of disclosing vulnerabilities monthly for the first time in a decade. In its July 2025 bulletin, the company didn't...