Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Redhotcyber Banner Sito 320x100px Uscita 101125
Banner Desktop

Author: Redazione RHC

Redazione RHC

The Red Hot Cyber Editorial Team provides daily updates on bugs, data breaches, and global threats. Every piece of content is validated by our community of experts, including Pietro Melillo, Massimiliano Brolli, Sandro Sana, Olivia Terragni, and Stefano Gazzella.

Through synergy with our industry-leading partners—such as Accenture, CrowdStrike, Trend Micro, and Fortinet—we transform technical complexity into collective awareness. We ensure information accuracy by analyzing primary sources and maintaining a rigorous technical peer-review process.

Numero di articoli trovati: 762

Connected and Vulnerable: How to Secure OT and ICS in 2025

In today's interconnected world, cybersecurity is not just about protecting information. Today, most devices and physical tools are connected to the network in some way. Whether for its structural operation...

Darkcloux 3.0 is here: Securonis Linux becomes more secure (and more extreme) than ever

Securonis Linux has released its most significant update: version 3.0 of "Darkcloux" and the 3.0-r1 patch. The release includes new utilities, redesigned components, and improvements to privacy and security. The main change...

Urobot watches you while you pee (but it’s for your own good)

A Taiwanese hospital is testing Urobot, a smart urinal that instantly analyzes urine and emails the results. Although the device is designed in a "cute" style, social media users have...

Smart TV or Living Room Spies? Here’s How They’re Monitoring You

Many owners of smart TV operating systems are increasingly finding themselves caught in a conflict that rages between the desire to preserve viewer privacy and pressure from the advertising industry....

Massive Windows Crash: The OpenVPN Flaw That Can Knock Out Infrastructures

A critical vulnerability has been discovered in the OpenVPN data channel offload driver for Windows, which can be exploited by local attackers to crash systems. The bug, classified as CVE-2025-50054,...

Android Under Attack: Godfather Malware Now Uses Virtualization to Fool Everyone

A new version of Android malware Godfather has been discovered that creates isolated virtual environments on mobile devices to steal data from banking applications. Recall that Godfather was first discovered in March...

ChatGPT is Shutting Down Our Brains! Alarming MIT Research Shows Mental Decay

During a RHC Conference, Corrado Giustozzi underlined a truth as simple as it is powerful: “Human beings have always been creators of amplifiers.”. From the wheel to the car, every...

Alleged Cyber Attack on Dana Pensiun Bank Mandiri

Alleged Cyber Attack on Dapenbankmandiri.co.id A well-known threat actor, using the alias "LordVoldemort," has claimed on an underground forum to be in possession of an alleged data set belonging to...

IntelBroker Claims Tesla Charging Database Breach

Recently, the threat actor known as IntelBroker , posted an alleged data breach. The post, which appeared on the BreachForums platform, claims that Tesla’s charging station database has been compromised and made...

Fortinet Issues Bulletin for Critical 9.8 Bug on FortiManager under Active Exploitation

Recently, Fortinet disclosed a critical vulnerability, identified as CVE-2024-47575, affecting FortiManager. This is a missing authentication vulnerability for critical functions [CWE-306] in the FortiManager fgfmd daemon, which could allow an...