Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Banner Ransomfeed 970x120 1
Precedente Successivo

Latest news

Work, Artificial Intelligence, and Marketing: What Skills Will We Need in 2025? Cyber News

Work, Artificial Intelligence, and Marketing: What Skills Will We Need in 2025?

In recent years, the marketing industry has undergone a radical transformation : today, one in two positions requires artificial intelligence...
Luca Vinciguerra - September 30, 2025
Nvidia CEO: “The gap with China is just a few nanoseconds.” Cyber News

Nvidia CEO: “The gap with China is just a few nanoseconds.”

On September 25, during the interview program Bg2 Pod , Nvidia CEO Jen-Hsun Huang expressed positions that fueled heated public...
Silvia Felici - September 30, 2025
Goodbye, real-life stars? Here comes Tilly Norwood, the first AI actress! Cyber News

Goodbye, real-life stars? Here comes Tilly Norwood, the first AI actress!

In an industry once dominated by live-action stars, digital characters are increasingly gaining traction. At a summit in Zurich, actress,...
Redazione RHC - September 30, 2025
Back to the On-Prem: Austrian Armed Forces Choose LibreOffice Cyber News

Back to the On-Prem: Austrian Armed Forces Choose LibreOffice

In recent years, many companies have gone cloud-first , outsourcing critical infrastructure and business services to platforms managed by external...
Redazione RHC - September 30, 2025
Digital Crisis Management: Communication Is the Key to Success or Failure Cyber News

Digital Crisis Management: Communication Is the Key to Success or Failure

In recent years, cyberattacks have become a major threat to businesses, regardless of industry. While technical departments focus on troubleshooting...
Redazione RHC - September 30, 2025
Balancing speed and security! This is the real challenge of Vibe Coding. Cyber News

Balancing speed and security! This is the real challenge of Vibe Coding.

The cybersecurity industry is undergoing a transformation: artificial intelligence is becoming not just a tool for developers, but also a...
Redazione RHC - September 30, 2025

He died because of ransomware! Another victim joins the list

This is not the first time that a cyber attack has resulted in the loss of human lives.We had already discussed it in the article "I deferichò per il ransomware....

A new fileless infostealer is being spread by Telegram and legitimate services

TLP: AMBERAnalyst: Agostino Pellegrino, Crescenzo Cuoppolo, Alessio BandiniLast revision date: 2025-06-24 This forensic technical report documents the complete analysis of a multi-stage infostealer delivered via a Python fileless loader, identified...

Citrix: New Critical Vulnerability from 9.2 Affects NetScaler – Attacks Underway!

Citrix has reported a new critical vulnerability in its NetScaler appliances, already actively exploited by attackers. The problem is identified with the identifier CVE-2025-6543 and affects the popular NetScaler ADC...

REvil: Sentenced but then set free. The most controversial court case ever

Do you remember the infamous REvil cyber gang? The Russian hacker group responsible for some of the most devastating ransomware attacks in the early days of this global threat, known...

Shock in France: the gentlemen of BreachForums were twenty-year-old French citizens!

Shocking news in France: one of the largest global cybercrime networks dismantled. The BreachForum hackers were… French. French authorities have busted a large cybercrime operation, arresting five young French hackers...

Zero-Click Attack on Notepad++. HackerHood Tested the Exploit and It Really Works with Little

A dangerous vulnerability has been discovered in the latest version of the popular text editor Notepad++ that allows an attacker togain complete control over the system. The vulnerability has been...

22,000 Sites At Risk: New Motors WordPress Vulnerability Allows Total Hacking

Attackers are actively exploiting a critical privilege escalation vulnerability in the WordPress Motors theme, allowing them to hijack administrator accounts and take complete control of the target site. The malicious activity was...

Qilin & Associates Law Firm: Ransomware Hires Lawyers, Launches “Intimidation Package”

The developers of the Qilin ransomware (recently interviewed by us) offered their partners the help and advice of a team of lawyers, so that they could put pressure on the...

US-Iran Cyberwar: DHS Raises Alarm, American Networks Under Attack

The United States has warned of possible cyber attacks by pro-Iranian groups following a series of airstrikes against Iranian nuclear facilities, as part of the armed conflict between Iran and...

“Jailbreak as a Service” is Coming: 60 Euros a Month to Purchase Cybercrime-Ready AI Systems

According to a report by Cato Networks, cybercriminals continue to actively use LLM patterns in their attacks. Specifically, we are talking about versions of theGrok and Mixtral patterns that have been deliberately modified to bypass...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE