Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

970x120 Olympous
Precedente Successivo

Latest news

Apple attacks Google Chrome: “Switch to Safari to protect your privacy.” Cyber News

Apple attacks Google Chrome: “Switch to Safari to protect your privacy.”

Apple has issued a stern warning: stop using Google Chrome. The world's most popular browser is competing with both desktops...
Redazione RHC - September 23, 2025
AI in the Hands of Criminal Hackers: The Game Has Changed, and We’re at a Disadvantage Cybercrime

AI in the Hands of Criminal Hackers: The Game Has Changed, and We’re at a Disadvantage

In recent months, during my research and studies, I have come across a reality as surprising as it is worrying:...
Ivan Garzaro - September 23, 2025
Samsung under attack in Italy: phones held hostage by ransomware Culture

Samsung under attack in Italy: phones held hostage by ransomware

For a few days now, news has been circulating, which I don't think has been confirmed by official sources, of...
Michele Pinassi - September 23, 2025
PureVPN on Linux: Researcher Finds Security and Anonymity Issues Cyber News

PureVPN on Linux: Researcher Finds Security and Anonymity Issues

An independent researcher named Andreas, who runs the blog Anagogistis , has discovered serious vulnerabilities in Pure VPN's Linux clients...
Redazione RHC - September 22, 2025
Ally Solos AI Glasses for the Visually Impaired: Autonomy and Safety Cyber News

Ally Solos AI Glasses for the Visually Impaired: Autonomy and Safety

Envision’s Ally Solos AI glasses are a breath of fresh air for people with visual impairments, helping them read ,...
Redazione RHC - September 22, 2025
First malware with integrated GPT-4 discovered: MalTerminal arrives Cyber News

First malware with integrated GPT-4 discovered: MalTerminal arrives

SentinelLABS researchers have discovered what they describe as the first known example of malware with integrated LLM functionality , dubbed...
Massimiliano Brolli - September 22, 2025

The dark side of the Windows Command Prompt: how malicious commands can replace legitimate ones

If you choose to read this article, please note that it will not discuss a vulnerability or a bug, but rather an intended behavior of Windows Command Prompt which, in...

RHC interviews RADAR and DISPOSSESSOR: “When it comes to security, the best defense is a good offense.”

In our usual underground analysis activities, we came into contact with the cyber gang DISPOSSESSOR, which came to attention in February 2024 in the cyber threat landscape. Accessing their Data...

IntelBroker Strikes Again: Unauthorized Access to Two Major American Companies Up for Sale

IntelBroker strikes again, announcing the sale of unauthorized access to two major American companies, each with revenues reaching hundreds of billions. This announcement was made public through a post on...

Exposed the Data of 3,379 Spanish Doctors! When Fraud Becomes “On-Target”

Recently, a threat actor in an underground forum called Breach Forums published an alleged data breach. The post claims to have exposed the names, departments, and emails of 3,379 Spanish...

The other side of cybersecurity: stress and burnout are “by design” in domain experts

We often talk about cyber security and the importance of a complete cyber program today. Today, however, we will focus on analyzing another important point in the profession of the...

PoC Released for SQL Injection Without Authentication on WordPress WZone Plugin

A proof of concept (PoC) for a critical vulnerability identified as CVE-2024-33544 has recently been released. This vulnerability involves an unauthenticated SQL injection, which poses a serious threat to the...

Sale of a 0Day RCE Exploit for GLPI HelpDesk

Recently, a user on the Breachforums known as "cisc0" posted an announcement regarding the sale of a 0Day exploit for GLPI HelpDesk. According to the user, this exploit works on...

Play Ransomware Claims Attack on MIPS Technologies

In the last few hours, the Data Leak site of the ransomware gang Play Ransomware has published a new claim: the giant MIPS Technologies (www.mips.com) has been the victim of...

The Hackers Choice – 30 years of hacking without trying to get rich!

Imagine a time before firewalls and ubiquitous encryption, when the digital frontier was wide open for exploration. Hackers weren't criminals, they were pioneers, fueled by an insatiable thirst for knowledge. ...

Rockstar Games Possibly Victim of a Massive Data Leak!

Recently, an alleged data leak has involved Rockstar Games, one of the world's largest video game producers, famous for titles like Grand Theft Auto and Red Dead Redemption. According to...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE