Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Mobile
HackTheBox 970x120 1

Author: Redazione RHC

Redazione RHC

The Red Hot Cyber Editorial Team provides daily updates on bugs, data breaches, and global threats. Every piece of content is validated by our community of experts, including Pietro Melillo, Massimiliano Brolli, Sandro Sana, Olivia Terragni, and Stefano Gazzella.

Through synergy with our industry-leading partners—such as Accenture, CrowdStrike, Trend Micro, and Fortinet—we transform technical complexity into collective awareness. We ensure information accuracy by analyzing primary sources and maintaining a rigorous technical peer-review process.

Numero di articoli trovati: 913

An SVG file disguised as a PDF led victims to a fake login

Microsoft Threat Intelligence specialists have identified an attack in which attackers used artificial intelligence for the first time to disguise phishing code. The goal was to steal credentials from companies...

Airports shut down, ransomware, four days of chaos, and a suspect arrested. An attack that shook Europe.

On September 19, a major cyber incident occurred in Europe, affecting Collins Aerospace, one of the world's largest aerospace technology suppliers . The attack disrupted airline operations and affected flights...

One added line of code and thousands of companies hacked. This is the magic of the Supply Chain!

Developers learned to trust the tools that help their AI assistants handle routine tasks, from sending emails to using databases. But this trust proved vulnerable: the postmark-mcp package, downloaded over...

Active Directory nel mirino! Come i criminal hacker rubano NTDS.dit

Active Directory (AD) contains the organization's digital keys: unauthorized access to this service exposes sensitive information and credentials that can lead to a complete domain compromise. Among the most critical...

YiBackdoor Arrives: What You Need to Know and How to Protect Your Network

In a new report, Zscaler ThreatLabz has revealed details of a new malware family called YiBackdoor , first observed in June 2025. From the outset, the analysis highlighted significant source...

Two Dutch men arrested on suspicion of espionage with ties to Russia

Dutch police have arrested two 17-year-old boys on suspicion of espionage activities, with possible links to Russia, the Telegraaf newspaper reported on Friday. The father of one of the young...

Ukrainian cyber attack paralyzes Russian SBP payment system

Cyber specialists from Ukraine's defense intelligence have successfully carried out an attack that paralyzed Russia's national payment system, SBP. DIU sources shared the news with Militarnyi . According to them,...

Forget brains and notebooks! ChatGPT dominates classrooms.

ChatGPT usage has skyrocketed with the start of the new school year in the West, with token generation hitting record levels. According to OpenRouter , the popular chatbot OpenAI processed...

Ransomware attack on European airports leaves Berlin in “emergency mode”

Berlin Airport (BER) remains in "emergency mode" for the fifth day after a major cyberattack on its supply chain. Der Spiegel reported the news in yesterday's update. IT services provider...

They slept on networks for 393 days! Chinese state hackers and the BRICKSTORM backdoor

According to Google Threat Intelligence , the China-linked espionage group UNC5221 has carried out a series of successful intrusions into corporate networks since March of this year, exploiting previously unknown...