Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
LECS 320x100 1
Banner Ransomfeed 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Rhadamanthys Stealer: Introduces an AI feature to extract seed phrases from images

Rhadamanthys is an advanced information stealer that first emerged in 2022. Featuring a rapid development cycle—with at least ten different...
Redazione RHC - 26 September 2025

Active Directory nel mirino! Come i criminal hacker rubano NTDS.dit

Active Directory (AD) contains the organization's digital keys: unauthorized access to this service exposes sensitive information and credentials that can...
Redazione RHC - 26 September 2025

YiBackdoor Arrives: What You Need to Know and How to Protect Your Network

In a new report, Zscaler ThreatLabz has revealed details of a new malware family called YiBackdoor , first observed in...
Redazione RHC - 26 September 2025

Fezbox Malware: The NPM Package That Steals Cookies with QR Codes

Researchers discovered a malicious package called fezbox in npm that steals victims' cookies. To ensure the malicious activity remains undetected,...
Redazione RHC - 26 September 2025

Two Dutch men arrested on suspicion of espionage with ties to Russia

Dutch police have arrested two 17-year-old boys on suspicion of espionage activities, with possible links to Russia, the Telegraaf newspaper...
Redazione RHC - 26 September 2025

Ukrainian cyber attack paralyzes Russian SBP payment system

Cyber specialists from Ukraine's defense intelligence have successfully carried out an attack that paralyzed Russia's national payment system, SBP. DIU...
Redazione RHC - 26 September 2025

Auto-Color malware distributed via a vulnerability in SAP NetWeaver

Darktrace has recorded a targeted attack on a US chemical company, in which attackers exploited a critical vulnerability in the SAP NetWeaver platform. The threat, registered as CVE-2025-31324, consisted of...
Share on Facebook Share on LinkedIn Share on X

Oscar-winning bug for macOS/iOS! An encrypted email causes the device to crash.

Can an encrypted email cause a macOS/iOS system to crash immediately? The answer is YES! This is not a science fiction plot, but a real attack, as revealed by the...
Share on Facebook Share on LinkedIn Share on X

Mr Robot Teaches: A Raspberry Pi with 4G support used by hackers to access a bank’s network

It has been reported by Group-IB that a Raspberry Pi with 4G support was exploited by the hacker group UNC2891, also known as LightBasin, in order to overcome security measures...
Share on Facebook Share on LinkedIn Share on X

What is malware? Between science fiction, the lab, and reality.

We often talk about "Malware". But even today, many people don't fully understand the real meaning of this word. With this article, we want to explain precisely what malware is,...
Share on Facebook Share on LinkedIn Share on X

What is vibe coding? Let’s discover the new frontier of programming.

"I need a system to manage my church events: volunteers, registration, community event planning.". Two weeks after writing this prompt, John Blackman, a 91-year-old retired electrical engineer, had developed a...
Share on Facebook Share on LinkedIn Share on X

AI fever hits Wyoming! A 10-gigawatt data center will consume more electricity than 600,000 people.

The U.S. state of Wyoming, with a population of just under 600,000, could have a data center that consumes more electricity than the state's entire population. The project, led by...
Share on Facebook Share on LinkedIn Share on X

The secret AI race: the United States, China, and billions of dollars! And Europe? Who will win?

In recent years, global competition in AI has reached unprecedented levels, driven by massive investments: United States, China, and European Unionrespectively plan to invest billions of dollars to be first...
Share on Facebook Share on LinkedIn Share on X

Happy birthday and RIP Windows 10! Ten years of Windows, from successes to failures.

It's been ten years since the release of Windows 10, the system designed to restore user confidence after the failed experiment with the Windows 8 interface. In 2015, Microsoft attempted...
Share on Facebook Share on LinkedIn Share on X

Nokia under attack: database of nearly 100,000 employees appears for sale on DarkForums.

A user with the nickname Tsar0Byte posted a shocking announcement on DarkForums, one of the most well-known underground forums in the cybercrime world: the alleged compromise of sensitive data belonging...
Share on Facebook Share on LinkedIn Share on X

Huawei Unveils Ascend 384 Super Node for AI at WAIC in Shanghai

At the WAIC Global Conference, Huawei showcased the innovative capabilities of its Ascend platform: data processing, training and inference, open source ecosystems, and solutions for industries such as the Internet,...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sito
A backdoor in NVIDIA code. Three 9.8 bugs plague AI and robotics development systems
Redazione RHC - 24/12/2025

When it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…

Immagine del sito
La Poste Hit by Pro-Russian DDoS Attack During Peak Holiday Season
Redazione RHC - 23/12/2025

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…

Immagine del sito
CVE-2025-47761: FortiClient VPN Zero-Day Exploit Lets Privilege Escalation
Manuel Roccon - 23/12/2025

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…

Immagine del sito
Critical MongoDB Vulnerability Exposed: CVE-2025-14847
Redazione RHC - 23/12/2025

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…

Immagine del sito
RansomHouse Ransomware Upgraded: Enhanced Encryption Threat
Redazione RHC - 22/12/2025

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…