Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Latest news

Harvest Now, Decrypt Later: risks to your data in the near future innovation

Harvest Now, Decrypt Later: risks to your data in the near future

Article written by Massimo Dionisi translated by Tara Lee The Harvest Now, Decrypt Later (HNDL) model describes an attack strategy...
Tara Lie - April 1, 2026
From CVSS 9.8 to 7.0: What Happened to the Telegram Bug? Vulnerability

From CVSS 9.8 to 7.0: What Happened to the Telegram Bug?

Yesterday, a critical vulnerability affecting the Telegram messenger was reported in the registry of the Zero Day Initiative (ZDI), identified...
Bajram Zeqiri - March 30, 2026
Just one Telegram sticker can hack you: the critical 9.8 RCE vulnerability still has no patch Vulnerability

Just one Telegram sticker can hack you: the critical 9.8 RCE vulnerability still has no patch

There is something deeply unsettling about this vulnerability: no click is required, nothing needs to be opened. Simply receiving the...
Carolina Vivianti - March 28, 2026
The Click War: Pornhub and the Global Standoff Over Age Verification Cyberpolitics

The Click War: Pornhub and the Global Standoff Over Age Verification

The digital landscape is undergoing a radical transformation, pitting adult industry titans against national regulators. At the heart of this...
Carolina Vivianti - March 25, 2026
Claude Down! Major Anthropic AI Outage Hits All Users Cyber News

Claude Down! Major Anthropic AI Outage Hits All Users

Users of Claude, the well-known AI model developed by Anthropic, are currently experiencing significant issues. According to recent reports, the...
Redazione RHC - March 2, 2026
Xi Jinping and the Chinese APT’s Ambition Cyberpolitics

Xi Jinping and the Chinese APT’s Ambition

The post-COVID macro political movements, including ongoing conflicts, have prompted a majority of states to shift their medium- to long-term...
Alessio Stefan - February 28, 2026
State-Sponsored “ILovePoop” Toolkit Targets Global Giants via React2Shell Vulnerability Cybercrime

State-Sponsored “ILovePoop” Toolkit Targets Global Giants via React2Shell Vulnerability

The shelf life of a critical vulnerability is often measured in days, but React2Shell is proving to have a terrifyingly...
Carolina Vivianti - February 22, 2026
Red Card 2.0: A major cybercrime bust! 651 scammers arrested in a major international operation. Cyber News

Red Card 2.0: A major cybercrime bust! 651 scammers arrested in a major international operation.

A major international operation against online scammers who have been defrauding individuals and businesses for years has concluded in Africa....
Redazione RHC - February 21, 2026
Google unveils Gemini 3.1 Pro: a major evolution of artificial intelligence Cyber News

Google unveils Gemini 3.1 Pro: a major evolution of artificial intelligence

In recent months, the pace at which artificial intelligence models are evolving has become almost dizzying. Each announcement seems to...
Redazione RHC - February 20, 2026
2149 BREAK THE SPHERE! The RHC & Hack The Box CTF at the RHC Conference 2026 innovation

2149 BREAK THE SPHERE! The RHC & Hack The Box CTF at the RHC Conference 2026

In 2149, the world is no longer divided into nations, but into mega Autonomous City-States, hyper-technological urban giants competing for...
Alessandro Molinari - February 16, 2026
RHC Interviews Anubis Ransomware: Their View on RAMP, LockBit and the RaaS “Market” Cybercrime

RHC Interviews Anubis Ransomware: Their View on RAMP, LockBit and the RaaS “Market”

Author: Luca Stivali, Raffaela Crisci, Lorenzo Nardi During the preliminary exchange leading up to the interview, Anubis expressed a very...
Luca Stivali - February 16, 2026
The Most Dangerous Sentence in IT: “Don’t Worry, They’re on Different VLANs” innovation

The Most Dangerous Sentence in IT: “Don’t Worry, They’re on Different VLANs”

In the world of IT, there is one expression that lowers defenses more effectively than any zero-day exploit: "Don't worry,...
Sandro Sana - February 14, 2026
   Next »
Harvest Now, Decrypt Later

Harvest Now, Decrypt Later: risks to your data in the near future

Article written by Massimo Dionisi translated by Tara Lee The Harvest Now, Decrypt Later (HNDL) model describes an attack strategy where encrypted data is collected today – despite being indecipherable...
Il logo di Telegram contornato da tanti stikers in una atmosfera festosa e armoniosa.

From CVSS 9.8 to 7.0: What Happened to the Telegram Bug?

Yesterday, a critical vulnerability affecting the Telegram messenger was reported in the registry of the Zero Day Initiative (ZDI), identified as ZDI-CAN-30207. The issue was discovered by Michael DePlante, a...

Just one Telegram sticker can hack you: the critical 9.8 RCE vulnerability still has no patch

There is something deeply unsettling about this vulnerability: no click is required, nothing needs to be opened. Simply receiving the content is enough. Researchers from the Trend Micro Zero Day...

The Click War: Pornhub and the Global Standoff Over Age Verification

The digital landscape is undergoing a radical transformation, pitting adult industry titans against national regulators. At the heart of this dispute is not the content itself, but the gateway to...

Claude Down! Major Anthropic AI Outage Hits All Users

Users of Claude, the well-known AI model developed by Anthropic, are currently experiencing significant issues. According to recent reports, the service appears to be undergoing a major outage that is...

Xi Jinping and the Chinese APT’s Ambition

The post-COVID macro political movements, including ongoing conflicts, have prompted a majority of states to shift their medium- to long-term political objectives. Clearly, a paradigm shift has been very common...

State-Sponsored “ILovePoop” Toolkit Targets Global Giants via React2Shell Vulnerability

The shelf life of a critical vulnerability is often measured in days, but React2Shell is proving to have a terrifyingly long tail. Months after its initial discovery, the flaw residing...

Red Card 2.0: A major cybercrime bust! 651 scammers arrested in a major international operation.

A major international operation against online scammers who have been defrauding individuals and businesses for years has concluded in Africa. Over the course of eight weeks, law enforcement arrested hundreds...

Google unveils Gemini 3.1 Pro: a major evolution of artificial intelligence

In recent months, the pace at which artificial intelligence models are evolving has become almost dizzying. Each announcement seems to redefine the next level of technological competition, and even those...

2149 BREAK THE SPHERE! The RHC & Hack The Box CTF at the RHC Conference 2026

In 2149, the world is no longer divided into nations, but into mega Autonomous City-States, hyper-technological urban giants competing for resources, data, and geopolitical power while the entire world is...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE