Red Hot Cyber. The Cybersecurity Blog

Critical Vulnerabilities Discovered in Hundreds of Brother and Other Printers
Hundreds of printer models from Brother and other manufacturers (Fujifilm, Toshiba, Ricoh and Konica Minolta) have been found to be vulnerable to serious vulnerabilities discovered by researchers at Rapid7. For example, the printers come with a default administrator password that

Pope warns: “AI is not the devil, but it can become one without ethics”
The head of the Catholic Churchhas expressed concern about the way today’s children and adolescents interact with digital technologies. In his viewthe abundance of information available through neural networks and other intelligent systems can seriously affect the mental and intellectual

Microsoft 365 Under Attack: How Hackers Use Direct Send to Send Phishing Emails
A sophisticated phishing campaign that targeted over 70 organizations by exploiting Microsoft 365’s Direct Send feature. The campaign, which began in May 2025 and has shown steady activity over the past two months, primarily targets U.S.-based organizations across multiple industries

Warning! WinRAR: Critical Vulnerability That Could Run Malware
WinRAR developers have fixed a Directory Traversal vulnerability, which has been assigned the identifier CVE-2025-6218. Under certain circumstances, this bug allowed malware to be executed after the archive was extracted. The vulnerability received a score of 7.8 on the CVSS

He died because of ransomware! Another victim joins the list
This is not the first time that a cyber attack has resulted in the loss of human lives.We had already discussed it in the article “I deferichò per il ransomware. I casi noto, le tendenze e il punto sull’Italia“, in

A new fileless infostealer is being spread by Telegram and legitimate services
TLP: AMBERAnalyst: Agostino Pellegrino, Crescenzo Cuoppolo, Alessio BandiniLast revision date: 2025-06-24 This forensic technical report documents the complete analysis of a multi-stage infostealer delivered via a Python fileless loader, identified with the acronym “AP”. The entire infection chain runs in

Cyber Security: CISA and NSA Recommend Secure Programming Languages
Redazione RHC - June 28th, 2025
The main US cybersecurity agencies, CISA and NSA, have published a joint document recommending that software developers opt for programming languages considered "memory safe". These languages are designed to provide...

Apple and Google under pressure: German regulator wants to remove DeepSeek
Redazione RHC - June 28th, 2025
Following the Italian data protection regulator, Germany's data protection watchdog has now asked Apple and Alphabet subsidiary Google to remove the Chinese artificial intelligence (AI) startup's DeepSeek app from their...

A former Australian university student has been accused of hacking Western Sydney University
Redazione RHC - June 28th, 2025
New South Wales police have arrested a 27-year-old former Western Sydney University student who had repeatedly hacked into the university's systems, including to obtain cheaper parking. Western Sydney University is...

Cyber War: The Invisible War in Cyberspace That Decides the Conflicts of the Present
Paolo Galdieri - June 27th, 2025
In the heart of contemporary conflicts, alongside tanks, drones and troops, an invisible, silent and often underestimated war is being fought: cyber war. It is not just a futuristic scenario...
Sign up for the newsletter