Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Mobile
Banner Desktop

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Cryptocurrencies, ransomware, and hamburgers: the fatal combo for Scattered Spider

The U.S. Department of Justice and British police have charged Talha Jubair, 19, a resident of East London, who investigators...
Redazione RHC - 25 September 2025

Blade Runner Already Predicted Deepfake! Cyber Lessons from Film Classics

“ Art is a mirror that reflects the soul of the beholder.” This quote, which captures the essence of our...
Daniela Farina - 25 September 2025

The freebie party is over! Open source infrastructure is at risk and needs funding.

An open letter signed by major open source foundations has raised the alarm about the future of the infrastructure that...
Redazione RHC - 25 September 2025

Zero-Day Vulnerabilities Found in Cisco IOS and IOS XE: Urgent Updates

Cisco has disclosed a zero-day vulnerability, tracked as CVE-2025-20352, in its widely used IOS and IOS XE software; this vulnerability...
Redazione RHC - 25 September 2025

Artificial Intelligence: A Double-Edged Sword in Digital Security

Artificial intelligence is increasingly being described as a double-edged sword, capable of offering enormous advantages but also opening new avenues...
Redazione RHC - 25 September 2025

Kali Linux 2025.3 is out! A new release with improvements and new tools.

Kali Linux developers have released a new release, 2025.3 , which expands the distribution's functionality and adds ten new penetration...
Redazione RHC - 24 September 2025

New Phishing Attacks Using Fake Zoom Meetings Aim to Steal Corporate Credentials

A phishing attack that mimics an urgent Zoom meeting is being used by cybercriminals to steal corporate credentials, using a fake interface so realistic it's nearly indistinguishable from a real...
Share on Facebook Share on LinkedIn Share on X

Is Your Smart TV Spying on You? Security Gaps and Critical Vulnerabilities in IoT Devices

Networked smart devices are no longer simple helpers, but potential enemies. With every new thermostat or TV connected to the internet, a new flaw opens up in the digital infrastructure...
Share on Facebook Share on LinkedIn Share on X

7,000 servers wiped out! Silent Crow and Cyberpartisans BY devastate Aeroflot in a historic cyber raid.

While the West battles ransomware attacks and private companies invest in defensive security, on the other side of the digital front, the war is being played out asymmetrically. On July...
Share on Facebook Share on LinkedIn Share on X

Boys recruited for murders and robberies: the FBI’s disturbing alert on the IRL Com group

The FBI has issued a warning about a rapidly growing threat from IRL Com, a subgroup of the underground group The Com that actively recruits teenagers to commit real-world crimes....
Share on Facebook Share on LinkedIn Share on X

Zero-click exploits: the new invisible frontier of cyber attacks

In recent years, cybersecurity has seen the emergence of increasingly sophisticated threats, capable of compromising devices and personal data without the user taking any action. Among these, so-called zero-click exploits...
Share on Facebook Share on LinkedIn Share on X

Fire Ant Attacks: How a vCenter Bug Opens the Door to IT Hell

Sygnia reports that the initial Fire Ant attack vector, CVE-2023-34048, exploits an out-of-bounds write vulnerability in the vCenter Server implementation of the DCERPC protocol, allowing unauthenticated remote code execution. Security...
Share on Facebook Share on LinkedIn Share on X

Critical vulnerability in WordPress Post SMTP plugin: over 200,000 sites at risk

Over 200,000 WordPress sites are vulnerable to a critical flaw in the popular Post SMTP plugin, allowing attackers to gain full control of the administrator account. The vulnerability has been...
Share on Facebook Share on LinkedIn Share on X

Target: Your Voice! Scattered Spider targets VMware ESXi by cloning employee voices.

The Scattered Spider group has intensified its attacks on corporate IT environments, targeting the VMware ESXi hypervisors of US companies in the retail, transportation, and insurance sectors. These attacks do...
Share on Facebook Share on LinkedIn Share on X

Supply Chain Attack: Millions of Projects at Risk Due to JavaScript Library Hack

The compromise of a widely used JavaScript library has put millions of projects worldwide at risk. The package in question has been a fundamental, yet unnoticed, component of the Node.js...
Share on Facebook Share on LinkedIn Share on X

BreachForums is back online! 7.3 million posts and 340,000 users restored.

If weeds aren't pulled out by the roots, they'll grow back, much more vigorous than before. This is cybercrime, and this is the new rebirth, the fifth ever from the...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sito
A backdoor in NVIDIA code. Three 9.8 bugs plague AI and robotics development systems
Redazione RHC - 24/12/2025

When it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…

Immagine del sito
La Poste Hit by Pro-Russian DDoS Attack During Peak Holiday Season
Redazione RHC - 23/12/2025

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…

Immagine del sito
CVE-2025-47761: FortiClient VPN Zero-Day Exploit Lets Privilege Escalation
Manuel Roccon - 23/12/2025

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…

Immagine del sito
Critical MongoDB Vulnerability Exposed: CVE-2025-14847
Redazione RHC - 23/12/2025

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…

Immagine del sito
RansomHouse Ransomware Upgraded: Enhanced Encryption Threat
Redazione RHC - 22/12/2025

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…