Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
TM RedHotCyber 320x100 042514
Banner Ransomfeed 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

RAN Hacking: US Intelligence Uncovers Clandestine Cellular Network in New York Cybercrime

RAN Hacking: US Intelligence Uncovers Clandestine Cellular Network in New York

U.S. intelligence agencies have reported discovering and seizing a network of telecommunications equipment in the New York area capable of...
Redazione RHC - 23 September 2025
Chrome for Android: From a “wall of text” to a podcast is a short step. Cybercrime

Chrome for Android: From a “wall of text” to a podcast is a short step.

Google has added a new AI-powered feature to Chrome for Android for reading web pages. Instead of reading the entire...
Redazione RHC - 23 September 2025
Developers safe: Mozilla introduces Firefox extension rollback feature. Cybercrime

Developers safe: Mozilla introduces Firefox extension rollback feature.

Mozilla has introduced a new feature for Firefox add-on developers that allows them to quickly revert to a previously approved...
Redazione RHC - 23 September 2025
$50 Deepfakes: The New Darknet Business Concerns Cybersecurity Cybercrime

$50 Deepfakes: The New Darknet Business Concerns Cybersecurity

Kaspersky Lab researchers have discovered advertisements on the darknet offering the ability to create video and audio deepfakes in real...
Redazione RHC - 23 September 2025
ClickFix: The Scam That Tricks Mac Users into Installing the AMOS Trojan Cybercrime

ClickFix: The Scam That Tricks Mac Users into Installing the AMOS Trojan

Cybercriminals have launched a large-scale campaign against macOS users, disguising malware as popular programs. LastPass reported this, having discovered that...
Redazione RHC - 23 September 2025
EDR-Freeze Arrives! It Puts Windows into a Deep Coma Without Vulnerable Drivers Cybercrime

EDR-Freeze Arrives! It Puts Windows into a Deep Coma Without Vulnerable Drivers

A Zero Salarium specialist has presented a method that temporarily disables antivirus processes and EDR agents on Windows using built-in...
Redazione RHC - 23 September 2025

Operation Checkmate: A major law enforcement coup. BlackSuit has been apprehended!

During a coordinated international operation dubbed Operation Checkmate, law enforcement officials have dealt a major blow to the BlackSuit ransomware group (onion link here, which has fallen into the hands...
Share on Facebook Share on LinkedIn Share on X

Criminal hackers claim responsibility for attack on Naval Group. 72 hours to pay the ransom.

France's largest defense shipbuilder, Naval Group, is facing a potentially serious cybersecurity incident following claims by threat actors that they have compromised critical internal systems, including those related to French...
Share on Facebook Share on LinkedIn Share on X

Electronic and robotic warfare: Ukraine is banking on “AD Berserk” to counter enemy drones.

Electronic warfare is taking on an increasingly strategic role in modern warfare, becoming a crucial element in protecting infrastructure, troops, and vehicles from airborne and digital threats. In this context,...
Share on Facebook Share on LinkedIn Share on X

Container isolation is at risk. Just 3 lines of code to breach NVIDIA’s AI environments.

Cloud security firm Wiz has identified a critical vulnerability in the NVIDIA Container Toolkit, identified as CVE-2025-23266 and with a CVSS score of 9.0. The vulnerability, dubbed NVIDIAScape, could pose...
Share on Facebook Share on LinkedIn Share on X

What is the Security Operation Center (SOC). The cyber threat control center?

Have you ever heard of the Security Operation Center, or SOC? What exactly is it? Cyber threats are always lurking, ready to exploit any weakness in organizations' systems and put...
Share on Facebook Share on LinkedIn Share on X

What does a CISO do? Meet the Chief Information Security Officer: a beautiful but demanding position.

How many times have we heard this acronym: CISO? But how many of us don't know precisely what it means or have little in-depth knowledge of what a Chief Information...
Share on Facebook Share on LinkedIn Share on X
Banner di sequestro del dominio XSS.IS con loghi BL2C, SBU ed Europol

XSS.IS Silenced! Inside the investigation that shut down one of cybercrime’s most feared bazaars.

Imagine opening your favorite forum bookmark, like every evening, to find new stealer variants or yet another batch of newly breached credentials. Instead of the usual noticeboard, a banner appears...
Share on Facebook Share on LinkedIn Share on X

What is AIOps? How Artificial Intelligence Works for IT Operations

AIOps (Artificial Intelligence for IT Operations) is the application of artificial intelligence - such as machine learning, natural language processing, and advanced analytics - to automate, simplify, and optimize IT...
Share on Facebook Share on LinkedIn Share on X

UK Says STOP Ransomware Attacks! Stop Public Administration Ransom Payments

The UK government has announced preparations for a radical measure to combat cybercrime: a ban on paying ransoms after ransomware attacks. The new ban applies to public sector organizations and...
Share on Facebook Share on LinkedIn Share on X

SharePoint and CrowdStrike: Two Faces of the Same Digital Fragility

In recent days, the global digital landscape has been rocked by a cybersecurity bug that affected on-premise Microsoft SharePoint servers, exposing thousands of organizations to cyber attacks. These are not...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Webrat Malware Targets Security Researchers with GitHub Exploit Traps
Redazione RHC - 24/12/2025

There’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…

Immagine del sitoCybercrime
A backdoor in NVIDIA code. Three 9.8 bugs plague AI and robotics development systems
Redazione RHC - 24/12/2025

When it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…

Immagine del sitoCybercrime
La Poste Hit by Pro-Russian DDoS Attack During Peak Holiday Season
Redazione RHC - 23/12/2025

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…

Immagine del sitoVulnerability
CVE-2025-47761: FortiClient VPN Zero-Day Exploit Lets Privilege Escalation
Manuel Roccon - 23/12/2025

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…

Immagine del sitoCybercrime
Critical MongoDB Vulnerability Exposed: CVE-2025-14847
Redazione RHC - 23/12/2025

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…