Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320x100 Itcentric
TM RedHotCyber 970x120 042543

Author: Redazione RHC

Redazione RHC

The Red Hot Cyber Editorial Team provides daily updates on bugs, data breaches, and global threats. Every piece of content is validated by our community of experts, including Pietro Melillo, Massimiliano Brolli, Sandro Sana, Olivia Terragni, and Stefano Gazzella.

Through synergy with our industry-leading partners—such as Accenture, CrowdStrike, Trend Micro, and Fortinet—we transform technical complexity into collective awareness. We ensure information accuracy by analyzing primary sources and maintaining a rigorous technical peer-review process.

Numero di articoli trovati: 907

Hacker Scattered LAPSUS$ Hunters: Unauthorized Access to Google LERS

Google executives said that hackers created a fake account on the Law Enforcement Request System (LERS), the company's platform used by law enforcement agencies to submit official data requests. Late...

Security alert for AI servers: thousands are at risk

Artificial intelligence systems are increasingly under attack. This data emerges from "Trend Micro State of AI Security Report, 1H 2025". The company urges IT professionals and community leaders to follow...

DeliveryRAT Trojan Alert: Hackers Steal Data and Money with Fake Apps

F6 and RuStore experts report having discovered and blocked 604 domains that were part of the infrastructure of hackers who infected mobile devices with the DeliveryRAT Trojan. The malware masqueraded...

Jaguar Land Rover cyberattack leaves $50 million in losses

The cyber attack on Jaguar Land Rover, which paralyzed the company's operations, has become one of the most serious crises for the British car manufacturer. The company was forced to...

From the Vatican to Facebook with fury: the miracle of a divine scam!

In recent years, online scams have taken on increasingly sophisticated forms, exploiting not only social engineering techniques but also the trust that millions of people place in religious, institutional, or...

Mustang Panda, New SnakeDisk Cyber Attack Targeting Thailand

IBM X-Force researchers have discovered new operations by the Chinese group Hive0154, better known as Mustang Panda. Experts have documented the simultaneous use of an advanced version of the Toneshell...

Goodbye, Windows 10! Microsoft warns that updates will end on October 14th.

Microsoft reminded users that support for the beloved Windows 10 will end in a month. Starting October 14, 2025, the system will no longer receive security updates, bug fixes, and...

BitLocker in the crosshairs: stealth attacks via COM hijacking. Online PoC

An innovative tool known as BitlockMove has been introduced, which highlights a novel lateral movement technique. This PoC leverages DCOM interfaces and COM hijacking, both of which are functional for...

The ChillyHell backdoor returns to threaten macOS systems.

Researchers have reported a new surge in activity for ChillyHell, a modular backdoor for macOS that was thought to be dormant for years, but which appears to have infected computers...

Linux in Crisis: Rust Splits Community and Maintainers Leave

The Linux world and its surroundings are going through turbulent times. Developers are debating how to integrate Rust into the kernel while key contributors are leaving. Against the backdrop of...