Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

970x120 Olympous
Precedente Successivo

Latest news

It’s Not Your PC’s Weak Link, It’s Your Mind: Exercises to Defend Yourself from Hackers Cybercrime

It’s Not Your PC’s Weak Link, It’s Your Mind: Exercises to Defend Yourself from Hackers

Welcome to our second installment! Last week, we explored the battlefield of the human mind, understanding how the coevolution of...
Daniela Farina - September 9, 2025
Google pushes AI as the default search, risking blackouts for independent publishers and blogs. Cyber News

Google pushes AI as the default search, risking blackouts for independent publishers and blogs.

Google wants to make it easier for users to access AI Mode by allowing them to set it as their...
Redazione RHC - September 9, 2025
Apache Jackrabbit RCE Vulnerability: Exploitation in Progress, Update Now Vulnerability

Apache Jackrabbit RCE Vulnerability: Exploitation in Progress, Update Now

A dangerous vulnerability has been discovered in Apache Jackrabbit that could lead to remote execution of arbitrary code and compromise...
Agostino Pellegrino - September 9, 2025
Italian call center companies leave all audio recordings online Cybercrime

Italian call center companies leave all audio recordings online

Italian companies that use online telephony platforms (VoIP) based on open-source software such as Asterisk and Vicidial rely on these...
Stefano Gazzella - September 9, 2025
Tasting the Exploit: HackerHood testa l’exploit di WINRAR CVE-2025-8088 Cyber News

Tasting the Exploit: HackerHood testa l’exploit di WINRAR CVE-2025-8088

Manuel Roccon, leader of Red Hot Cyber's HackerHood ethics team, has created a detailed video demonstration on YouTube that demonstrates...
Silvia Felici - September 9, 2025
NightshadeC2, the new botnet that uses unconventional methods to bypass protection Cyber News

NightshadeC2, the new botnet that uses unconventional methods to bypass protection

eSentire has reported the discovery of a new botnet called NightshadeC2, which uses unconventional methods to bypass protection and sandboxes....
Sandro Sana - September 9, 2025

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE