Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320×100
LECS 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Incitement to Suicide and OpenAI. New Security Measures Introduced for ChatGPT Cybercrime

Incitement to Suicide and OpenAI. New Security Measures Introduced for ChatGPT

OpenAI has announced new security measures for ChatGPT following a series of tragic stories and lawsuits accusing the chatbot of...
Redazione RHC - 17 September 2025
Next Cybersecurity: Fight AI with Artificial Intelligence Cybercrime

Next Cybersecurity: Fight AI with Artificial Intelligence

The Artificial Intelligence Security Governance Forum was held in Kunming, Yunnan Province, southwestern China, as part of the National Cybersecurity...
Redazione RHC - 17 September 2025
Taiwan raises alert: Monitoring submarine cables for Chinese interference Cybercrime

Taiwan raises alert: Monitoring submarine cables for Chinese interference

In the Taiwan Strait, the local Coast Guard ha intensified patrolling activities To protect the undersea cables, infrastructure considered vital...
Redazione RHC - 17 September 2025
SlopAds: 38 million app installs sending 2.3 billion offers per day Cybercrime

SlopAds: 38 million app installs sending 2.3 billion offers per day

A massive ad fraud scheme called SlopAds has been hiding behind hundreds of "harmless" Android apps and has reached global...
Redazione RHC - 17 September 2025
Apple warns users of targeted spyware attacks Cybercrime

Apple warns users of targeted spyware attacks

CERT-FR reported that Apple warned users late last week that their devices were being targeted by spyware attacks. Experts say...
Redazione RHC - 17 September 2025
Google changes Android strategy: no more monthly patches, only risk-based fixes. Cybercrime

Google changes Android strategy: no more monthly patches, only risk-based fixes.

Google has changed its Android security update strategy, breaking its tradition of disclosing vulnerabilities monthly for the first time in...
Redazione RHC - 17 September 2025

Need a Microsoft Windows product key? No problem, ask Chat-GPT.

ChatGPT has once again proven vulnerable to unconventional manipulation: this time it issued valid Windows product keys, including one registered to the major bank Wells Fargo. The vulnerability was discovered...
Share on Facebook Share on LinkedIn Share on X

What is Cyber Security? Threats, Cybercrime, Protection, and Work

Cybersecurity has become one of the most important issues in the digital age we live in. With the increase in the number of connected devices, the widespread use of the...
Share on Facebook Share on LinkedIn Share on X

Attacks on Artificial Intelligence: Adversarial Attacks and Data Poisoning.

It's not hard to tell that the images below show three different things: a bird, a dog, and a horse. But to a machine learning algorithm, all three might look...
Share on Facebook Share on LinkedIn Share on X

AI Agents: The Intelligent Revolution Explained to Everyone

Imagine a digital assistant who not only answers your questions, but also acts for you, plans strategies, learns from its mistakes, and collaborates with others to solve complex problems. This...
Share on Facebook Share on LinkedIn Share on X

RCE 0day Exploit for WinRAR and WinZIP for Sale on Exploit.in for Scam Phishing Emails

Recently, the popular underground forum exploit.in, currently closed and accessible by invitation only, has been offering exploits for a 0day vulnerability affecting the well-known WinRAR and WinZIP programs. The ad,...
Share on Facebook Share on LinkedIn Share on X

What was the first ransomware in history? Discovering Trojan AIDS

We often talk about ransomware on Red Hot Cyber and criminal cyber gangs. But who invented this dangerous cyber blackmail "weapon"? Today, ransomware attacks have become familiar to most people,...
Share on Facebook Share on LinkedIn Share on X

Creeper & Reaper: The story of the first worm and the first antivirus software.

It's not uncommon to find references to information technology innovations in video games. Ada Lovelace (the first programmer in history), gave her name to the robot in Folsom 4, but...
Share on Facebook Share on LinkedIn Share on X

Businesses are going bankrupt due to ransomware. Small and medium-sized businesses, beware!

Very often on RHC, we talk about cyber attacks and ransomware. But this time, we want to go further. We want to talk about the companies that didn't make it,...
Share on Facebook Share on LinkedIn Share on X

What is ransomware? Let’s explore how RaaS works and what it means.

Many people often want to understand the ransomware phenomenon precisely, its meaning, the methods of violation, and the crime that revolves around it, struggling to find information scattered across thousands...
Share on Facebook Share on LinkedIn Share on X

The Shellter Elite suite used by Red Teams to bypass EDRs is now being used by cybercrime

Shellter Project, maker of a commercial downloader for bypassing antivirus and EDR systems, has reported that hackers are using its Shellter Elite product for attacks. This is because one of...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
A $500 Tool Claims to Kill EDRs at Kernel Level: Inside the NtKiller Underground Ad
Redazione RHC - 25/12/2025

An ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…

Immagine del sitoCybercrime
Webrat Malware Targets Security Researchers with GitHub Exploit Traps
Redazione RHC - 24/12/2025

There’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…

Immagine del sitoCybercrime
A backdoor in NVIDIA code. Three 9.8 bugs plague AI and robotics development systems
Redazione RHC - 24/12/2025

When it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…

Immagine del sitoCybercrime
La Poste Hit by Pro-Russian DDoS Attack During Peak Holiday Season
Redazione RHC - 23/12/2025

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…

Immagine del sitoVulnerability
CVE-2025-47761: FortiClient VPN Zero-Day Exploit Lets Privilege Escalation
Manuel Roccon - 23/12/2025

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…