Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Fortinet 970x120px
Precedente Successivo

Latest news

CrowdStrike: Cybersecurity Enters the Age of AI Agents Cybercrime

CrowdStrike: Cybersecurity Enters the Age of AI Agents

At Fal.Con 2025, the annual conference that brings together thousands of cybersecurity experts from around the world, CrowdStrike made one...
Marcello Filacchioni - September 24, 2025
Violent social media and video games: the new ticking time bomb for teens. Cyber News

Violent social media and video games: the new ticking time bomb for teens.

The uncontrolled use of social media and violent video games poses a growing threat to adolescents at a crucial stage...
Redazione RHC - September 24, 2025
TikTok, the app setting the US ablaze: billion-dollar deal for total control Cyber News

TikTok, the app setting the US ablaze: billion-dollar deal for total control

TikTok's fate in the United States is now inextricably linked to political negotiations. The White House has announced that the...
Redazione RHC - September 24, 2025
Supply Chain: The blockade of European airports raises concerns about an increasingly critical issue. Cybercrime

Supply Chain: The blockade of European airports raises concerns about an increasingly critical issue.

On September 20, 2025, a cyberattack hit three of Europe's major airports: London Heathrow, Brussels, and Berlin. The digital systems...
Paolo Galdieri - September 24, 2025
Dedigitalization: Japanese city of Toyoda restricts smartphone use Cyber News

Dedigitalization: Japanese city of Toyoda restricts smartphone use

In the Japanese city of Toyoda (Aichi Prefecture), city council members approved a draft ordinance limiting smartphone use during leisure...
Silvia Felici - September 24, 2025
ShadowV2: New MaaS botnet for DDoS attacks uses containers Cyber News

ShadowV2: New MaaS botnet for DDoS attacks uses containers

Amid growing criminal activity, Darktrace has uncovered a new campaign using the ShadowV2 botnet. Researchers detected malicious activity on June...
Sandro Sana - September 24, 2025

Potential Compromise of a U.S. Military Database

A high-ranking user of BreachForums, known as "GOD," is reportedly selling an alleged database belonging to the U.S. Military, which purportedly contains data on over 385,000 personnel and contractors. This...

Hellcat Claims an Alleged Breach Against Schneider Electric

In recent hours, the ransomware group known as Hellcat has claimed responsibility for an alleged attack against Schneider Electric, a global leader in energy management and automation. This supposed breach...

Herm1t Interview – From VX Heaven to the war gates!

This is the story of Herm1t, founder of VX-Heaven, hacker - currently active in protecting Ukraine from 2014 -  and founder of RUH8 in fall 2015, told by means of...

IBM Hacked? Threat Actor ‘888’ Reveals Thousands of Employees’ Data Leak!

Recently, the notorious Threat Actor, identified by the nickname 888 , claimed to have breached IBM systems and stolen personal data belonging to the company's employees. The leak, dated October 2024, allegedly resulted in the compromise...

Fortinet Issues Bulletin for Critical 9.8 Bug on FortiManager under Active Exploitation

Recently, Fortinet disclosed a critical vulnerability, identified as CVE-2024-47575, affecting FortiManager. This is a missing authentication vulnerability for critical functions [CWE-306] in the FortiManager fgfmd daemon, which could allow an...
elezioni USA psy ops

US Elections and psy-ops: main threats come from Digital Echo Chambers and erosion of trust in democratic processes

On November 5th, 2024, the next President and Vice President of the United States of America will be elected, as well as 1/3 of the U.S. Senators and all 435...

T-Space Architects Potentially Targeted by Cicada3301 in Data Broker Ransomware Attack  

 London-based architectural firm T-Space Architects may find itself at the center of a significant cyberattack. The ransomware group Cicada3301 has reportedly added T-Space to its growing list of victims, threatening...

Stormous claims an attack on NASA

In recent years, the landscape of cyber threats has been dominated by increasingly sophisticated ransomware groups. Among them, the ransomware group Stormous has gained notoriety for targeting high-profile organizations, including...

The Story Of Conti Ransomware – Origins and Evolution of the RaaS Model (Episode 1)

Ransomware, a malware designed to encrypt data making them restorable only with the use of a private key. Relatively simple math is all that threat actors out there needs to...

RHC Interviews Lynx Ransomware. The cyber-gang offering Pentest services ensuring privacy

In July 2024, the Lynx group burst into the RaaS world, which from the outset demonstrated above-average aggressiveness and success in attacks with a total of 22 victims featured on...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE