Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
HackTheBox 320x100 1
Crowdstriker 970×120

Author: Redazione RHC

Redazione RHC

The Red Hot Cyber Editorial Team provides daily updates on bugs, data breaches, and global threats. Every piece of content is validated by our community of experts, including Pietro Melillo, Massimiliano Brolli, Sandro Sana, Olivia Terragni, and Stefano Gazzella.

Through synergy with our industry-leading partners—such as Accenture, CrowdStrike, Trend Micro, and Fortinet—we transform technical complexity into collective awareness. We ensure information accuracy by analyzing primary sources and maintaining a rigorous technical peer-review process.

Numero di articoli trovati: 900

Towards the Ouroboros! OpenAI CEO warns: Social media is full of AI bot content.

We are making giant strides towards the true ouroboros, or the snake that eats its own tail. We talked about it a few weeks ago that human traffic on the...

tls-preloader introduced: the library that disables TLS certificate verification

A Limes Security researcher, under the pseudonym f0rw4rd, has presented a new tool for developers and testers: tls-preloader. This is a universal library that allows you to completely disable TLS...

Rogue TLS certificates discovered for Cloudflare’s DNS service 1.1.1.1

Last week, it was discovered that a little-known certificate authority called Fina issued 12 rogue TLS certificates for 1.1.1.1 (a popular Cloudflare DNS service) between February 2024 and August 2025,...

Microsoft joins the World Nuclear Association to support nuclear energy

Microsoft Corporation, according to Datacenter Dynamics, has joined the World Nuclear Association (WNA), an international nonprofit organization based in London that promotes nuclear energy. The World Nuclear Association was founded...

Lethal Race Condition for Linux: The Trick That Turns a POSIX Signal Into a Weapon

An independent researcher named Alexander Popov has presented a new technique for exploiting a critical vulnerability in the Linux kernel, assigned the identifier CVE-2024-50264. This use-after-free error in the AF_VSOCK...

Google pushes AI as the default search, risking blackouts for independent publishers and blogs.

Google wants to make it easier for users to access AI Mode by allowing them to set it as their default search (instead of traditional links). AI Mode is a...

Hackers bypass the most stringent WAFs with a single line of JavaScript! The moral? Always write securely.

In a security test, Ethiack researchers found a way to bypass even the most stringent web application firewalls using an unusual technique: JavaScript injection via HTTP parameter pollution. The test...

Thermoptic: The Tool for Bypassing Fingerprint-Based Lock Systems

Security researcher Matthew Bryant recently unveiled Thermoptic, an innovative tool that acts as an HTTP proxy. This tool can disguise network requests to appear to be traffic from the Chrome...

Cephalus is coming! The ransomware group that attacks via DLL replacement.

In mid-August, researchers encountered the Cephalus ransomware in two separate incidents. Among recent outbreaks of families like Crux and KawaLocker, a ransom note beginning with the words "We are Cephalus"...

The largest pirate sports streaming network has been shut down.

Egyptian authorities and the Alliance for Creativity and Entertainment (ACE) say they have shut down Streameast, the largest illegal sports streaming network in the world, and arrested two of the...