Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Redhotcyber Banner Sito 970x120px Uscita 101125
Precedente Successivo

Latest news

A manifesto after 72 hours! Will cybercriminals really retreat? Cyber News

A manifesto after 72 hours! Will cybercriminals really retreat?

Fifteen of the most notorious cybercriminal groups, including Scattered Spider, ShinyHunters, and Lapsus$, have announced their closure. Their collective statement,...
Marcello Filacchioni - September 18, 2025
Next Cybersecurity: Fight AI with Artificial Intelligence Cyber News

Next Cybersecurity: Fight AI with Artificial Intelligence

The Artificial Intelligence Security Governance Forum was held in Kunming, Yunnan Province, southwestern China, as part of the National Cybersecurity...
Agostino Pellegrino - September 17, 2025
Taiwan raises alert: Monitoring submarine cables for Chinese interference Cyber News

Taiwan raises alert: Monitoring submarine cables for Chinese interference

In the Taiwan Strait, the local Coast Guard ha intensified patrolling activities To protect the undersea cables, infrastructure considered vital...
Sandro Sana - September 17, 2025
SlopAds: 38 million app installs sending 2.3 billion offers per day Cyber News

SlopAds: 38 million app installs sending 2.3 billion offers per day

A massive ad fraud scheme called SlopAds has been hiding behind hundreds of "harmless" Android apps and has reached global...
Redazione RHC - September 17, 2025
Apple warns users of targeted spyware attacks Cyber News

Apple warns users of targeted spyware attacks

CERT-FR reported that Apple warned users late last week that their devices were being targeted by spyware attacks. Experts say...
Bajram Zeqiri - September 17, 2025
ShinyHunters violates Gucci, Balenciaga, and Alexander McQueen: $7.4 million worth of records exposed Cybercrime

ShinyHunters violates Gucci, Balenciaga, and Alexander McQueen: $7.4 million worth of records exposed

Kering, the luxury and fashion giant, has officially announced that a data breach was perpetrated against customers of its leading...
Stefano Gazzella - September 17, 2025

Anubi, the EDR for your malware and network security

In the current modern context where a cyber war is in progress, the concept of cybersecurity awareness and perimeter fortification is increasingly necessary. In this situation, target objectives are spread...

PRAISE TO VX-UNDERGROUND – The hack-library turns 5!

Every nerd or technology enthusiasts cannot deny the influence of the 1980s on modern computer science. Commodore Amiga, Nintendo, Apple II, now computers are affordable to everyone who could finally...

RHC interviews Professor Andrea Morello from the ARC Centre of Excellence for Quantum Computation at the University of New South Wales in Australia

Original Author: Roberto Campagnola, 30 June 2023, Translator: Tara Lie, 14 May 2024 Red Hot Cyber’s Quantum Computing group has interviewed Professor Andrea Morello. Professor Morello is an Italian scientist,...
ClamAV

ClamAV and signatures generation

Threat intelligence has many fields of application, starting from control of infrastructures using automation processes to security increasing the perimeter of applications and solutions in general. One of the most...

Loki, starting IOC discovering

Today is always more important and significant to be efficient in controlling our own infrastructures; actions to put in place for this verification process shall require both proactive and post-action...

Flipping pages, from userland to godmode

Traslate: Antonio Piovesan On X, Lau (@notselwyn) (https://twitter.com/notselwyn/) released a blogpost on 26 March at https://pwning.tech/nftables/ describing an elaborate attack on the Linux kernel that allows privilege escalation by exploiting...

Likely Iranian-Origin Phishing Attack: New Threat to Online Security in Italy!

In the vast landscape of computing, increasingly insidious threats emerge that jeopardize the online security of both companies and ordinary users. In this context, phishing attacks represent one of the...

Discovering the Traffic Light Protocol (TLP). How to exchange sensitive information

Author: Massimiliano Brolli - March, 5th 2024 07:23English translation: Antonio Piovesan - March, 11th 2024 How can we ensure that sensitive data is exchanged securely and efficiently? As answer to...

Discover Quantum Computing

Welcome to the Red Hot Cyber community’s Quantum Technology Group page. The themed group will be lead by industry experts, and will focus on the dissemination and the study of...

How CDNs can save your website: Speed and security at the highest level

Let's talk a bit about CDNs, or Content Delivery Networks, and how they can be real digital lifesavers. Imagine being in a crowded restaurant. There's only one waiter running around...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE