Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
LECS 320x100 1
LECS 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

North Korean hackers steal $2 billion in cryptocurrency in nine months of fraud

A North Korean-linked hacking network stole over $2 billion in cryptocurrency in the first nine months of 2025. Elliptic analysts...
Redazione RHC - 8 October 2025

Scattered Lapsus$ Hunters: “We’re paying those who bombard corporate executives with emails.”

Renewing their strategy, the Scattered Lapsus$ Hunters group has returned to the forefront with a new and surprising tactic to...
Redazione RHC - 8 October 2025

Redox OS introduces multithreading by default and improves performance.

The developers of the Redox OS operating system, written in Rust, have enabled multithreading support by default for x86 systems....
Redazione RHC - 8 October 2025

Feed Wars: Pro-Israel PsyOps Land on TikTok and ChatGPT

The Israeli government has awarded the American company Clock Tower X LLC a $6 million contract to conduct a large-scale...
Redazione RHC - 8 October 2025

Do you have Teams? You’re a Target! The Microsoft Platform is Targeted by States and Criminals

The Microsoft Teams collaboration platform has become a popular target for attackers, as its widespread adoption has made it a...
Redazione RHC - 8 October 2025

Google CodeMender is here! When AI finds bugs in code and fixes them itself.

It would be fantastic to have an AI agent capable of automatically analyzing our projects' code, identifying security bugs, generating...
Redazione RHC - 7 October 2025

When a VPN Becomes a Spy! FreeVPN.One Takes Unauthorized Screenshots

Koi Security experts warn that the behavior of the popular Chrome extension FreeVPN.One has recently changed. It has begun secretly capturing screenshots of users' activity and transmitting them to a...
Share on Facebook Share on LinkedIn Share on X

RapperBot DDoS botnet dismantled and alleged developer arrested

The U.S. Department of Justice has indicted the alleged developer and administrator of the RapperBot DDoS botnet, which was leased to cybercriminals. The botnet itself was seized by law enforcement...
Share on Facebook Share on LinkedIn Share on X

The “My Wife” case and the challenges of digital responsibility: privacy, revenge porn, and the role of platforms

The recent incident involving the Facebook group "My Wife," active since 2019 and boasting over 32,000 members, highlights a dynamic intertwining privacy violations, nonconsensual pornography, systemic misogyny, and serious questions...
Share on Facebook Share on LinkedIn Share on X

Google’s 2025 Performance Review: Fewer Bugs, More Vibe Coding

For Google employees, "staying ahead of the curve" means not just developing AI, but also being able to use it every day. In recent months, the company has seen growing...
Share on Facebook Share on LinkedIn Share on X

$20 million in zero-day exploits from broker Advanced Security Solutions

Advanced Security Solutions, based in the United Arab Emirates, was founded this month and is offering up to $20 million for zero-day vulnerabilities and exploits that would allow anyone to...
Share on Facebook Share on LinkedIn Share on X

Will 2029 be the year of Q-Day? But what if the SHA1 replacement took 12 years?

Security experts are increasingly talking about "Q-Day," the moment when quantum computers will be able to handle modern encryption algorithms. Predictions from major players, from IBM and Google to Gartner...
Share on Facebook Share on LinkedIn Share on X

Critical Downgrade Bug in Chat-GPT Leads to Jailbreak of Model

A critical flaw found in OpenAI's latest model, ChatGPT-5, allows attackers to bypass advanced security features through the use of simple expressions. This bug, dubbed "PROMISQROUTE" by researchers at Adversa...
Share on Facebook Share on LinkedIn Share on X

China’s Great Firewall blocks internet traffic for 74 minutes

Researchers from the Great Firewall Report team noticed that on the night of August 20, China's Great Firewall experienced a technical issue or was undergoing some type of testing. All...
Share on Facebook Share on LinkedIn Share on X

A Criminal Hacker Sells Access to Roche Underground Servers

A recent post on an underground forum has attracted the attention of cybersecurity experts. A user claimed to have sold administrative access to Roche, a pharmaceutical giant with over 100,000...
Share on Facebook Share on LinkedIn Share on X

972 million Google Play VPN users are at risk!

Citizen Lab analysts have reported that more than 20 VPN apps on the Google Play Store have serious security issues that threaten users' privacy and allow the decryption of transmitted...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sito
RansomHouse Ransomware Upgraded: Enhanced Encryption Threat
Redazione RHC - 22/12/2025

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…

Immagine del sito
Cyber Attacks on the Rise: Wiper Malware and Data Destruction in 2025
Redazione RHC - 22/12/2025

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers use wipers, destructive tools that…

Immagine del sito
MS13-089 Ransomware: Double Extortion Without Encryption
Inva Malaj - 22/12/2025

MS13-089 opens a leak site on the dark web, exposes the first data and adopts a double extortion strategy without encryption. A brand built on an old Microsoft ID For years, “MS13-089” identified a 2013…

Immagine del sito
Microsoft Shifts Activation Process: What It Means for Air-Gapped Systems
Redazione RHC - 22/12/2025

In the past, many users and system administrators have relied on Microsoft’s telephone activation service to manage installations in specific contexts. During the Windows 8 era, MAK ( Multiple Activation Key) licenses were widely available.…

Immagine del sito
DIG AI: The Dark Web’s New AI Tool for Cybercrime
Redazione RHC - 21/12/2025

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…