Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Banner Desktop
Precedente Successivo

Latest news

Two critical bugs in Cisco ASA and FTD: score 9.9 and risk of remote code execution Vulnerability

Two critical bugs in Cisco ASA and FTD: score 9.9 and risk of remote code execution

Cisco has disclosed two critical vulnerabilities affecting its Secure Firewall Adaptive Security Appliance (ASA) and Secure Firewall Threat Defense (FTD)...
Agostino Pellegrino - September 25, 2025
Code as we knew it is dead! Artificial Intelligence writes the future. Cyber News

Code as we knew it is dead! Artificial Intelligence writes the future.

Since 2013, the IEEE has published an annual interactive ranking of the most popular programming languages . However, traditional methods...
Luca Vinciguerra - September 25, 2025
Blade Runner Already Predicted Deepfake! Cyber Lessons from Film Classics Cybercrime

Blade Runner Already Predicted Deepfake! Cyber Lessons from Film Classics

“ Art is a mirror that reflects the soul of the beholder.” This quote, which captures the essence of our...
Daniela Farina - September 25, 2025
The freebie party is over! Open source infrastructure is at risk and needs funding. Cyber News

The freebie party is over! Open source infrastructure is at risk and needs funding.

An open letter signed by major open source foundations has raised the alarm about the future of the infrastructure that...
Redazione RHC - September 25, 2025
Zero-Day Vulnerabilities Found in Cisco IOS and IOS XE: Urgent Updates Vulnerability

Zero-Day Vulnerabilities Found in Cisco IOS and IOS XE: Urgent Updates

Cisco has disclosed a zero-day vulnerability, tracked as CVE-2025-20352, in its widely used IOS and IOS XE software; this vulnerability...
Agostino Pellegrino - September 25, 2025
Artificial Intelligence: A Double-Edged Sword in Digital Security Cyber News

Artificial Intelligence: A Double-Edged Sword in Digital Security

Artificial intelligence is increasingly being described as a double-edged sword, capable of offering enormous advantages but also opening new avenues...
Silvia Felici - September 25, 2025
UK digital Crackdown

The UK’s Digital Crackdown: how the government is using our online habits to breach human rights


In today's digital age, the boundaries between lawful expression and governmental overreach are becoming increasingly blurred in the United Kingdom. Citizens are finding themselves under scrutiny, and in some cases,...

The Story Of Conti Ransomware – The Last Ceremony (Final Episode)

This is the last episode of “The Story Of Conti Ransomware” series, we would finally reach the decline of the group and what this means for the current ransomware landscape....

FBI responds to threats and announcement of LockBit 4.0

In the last month of 2024, LockBit has been exodusively talked about. The prominent news is the long-awaited release of the 4.0 program of the most famous RaaS in the...

Brain Chiper claims computer attack on Deloitte. 1 Tera Byte of data

At 14:35 today, the claim of a cyber attack on the consulting giant Deloitte was detected on BrainChiper's Data Leak Site. A countdown is active, marking the time for the...

The Exploit for the RCE on Palo Alto Firewalls is now Online! And let the Administration be for all

A few hours ago on Breach Forum, a threat actor by the name “newplzqibeme” shared a GitHub repository where a python-written exploit for active exploitation of CVE-2024-0012 on PanOS (the...

RHC DarkLab Interviews Interlock Ransomware. “Don’t waste your energy and time. We will do it for you.”

RHC DarkLab has always taken a unique and provocative approach in the fight against cyber threats, summed up by the motto: ‘One must know the Demons to learn how to...

How Threat Actor make EDR’s harmless with a reboot

I became aware of this technique like 9 months ago, and now I see this on a attack in the wild conducted by Qilin Ransomware Gang, so it’s time to...

The Story Of Conti Ransomware – The War Within (Episode 2)

This is a continuation of the Conti story. You can read the previous part, which covered the group's origins, in the previous article. We will now explore the internal components...

IntelBroker Claims Tesla Charging Database Breach

Recently, the threat actor known as IntelBroker , posted an alleged data breach. The post, which appeared on the BreachForums platform, claims that Tesla’s charging station database has been compromised and made...
Luca Cadonici Mobile Forenics intervista

Interview with Luca Cadonici: computer and mobile forensics towards a proactive approach against cybercrime

Nowadays, the Digital Forensics is not just a weapon to fight crime but a scientific discipline that "is no longer limited to reactive post-incident analysis but has evolved towards a...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE