Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Ransomfeed 320x100 1
UtiliaCS 970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

RHC interviews ShinyHunters: “Systems can be repaired, but people remain vulnerable!” Cybercrime

RHC interviews ShinyHunters: “Systems can be repaired, but people remain vulnerable!”

ShinyHunters is a group of threat actors that gained notoriety after the massive data breach against Salesforce, an incident that...
RHC Dark Lab - 17 September 2025
Perl returns to the top 10 most popular programming languages Cybercrime

Perl returns to the top 10 most popular programming languages

TIOBE Software has released its September ranking of the most popular programming languages. The highlight of the publication was Perl's...
Redazione RHC - 17 September 2025
Hacker Scattered LAPSUS$ Hunters: Unauthorized Access to Google LERS Cybercrime

Hacker Scattered LAPSUS$ Hunters: Unauthorized Access to Google LERS

Google executives said that hackers created a fake account on the Law Enforcement Request System (LERS), the company's platform used...
Redazione RHC - 17 September 2025
Chat Control: Between hunting down illegal channels and cracking down on freedom and privacy Cybercrime

Chat Control: Between hunting down illegal channels and cracking down on freedom and privacy

The news is simple, the technology is not. Chat Control (CSAR) was created to uncover CSAM and grooming dynamics within...
Sandro Sana - 16 September 2025
An e-cigarette becomes a web server. And let hacking be! Cybercrime

An e-cigarette becomes a web server. And let hacking be!

Richard Stallman said many years ago "Playfully doing something difficult, whether it's useful or not, that's hacking!" Romanian engineer and...
Redazione RHC - 16 September 2025
Critical Linux Vulnerability: 0-Click N-Days Exploit Allows Remote Code Execution Cybercrime

Critical Linux Vulnerability: 0-Click N-Days Exploit Allows Remote Code Execution

A security researcher recently developed a zero-click exploit for the Linux SMB3 kernel daemon (ksmbd), exploiting two specific vulnerabilities. This...
Redazione RHC - 16 September 2025

Claude Shannon: Father of Cryptography and Founder of the Information Age

Whoever has as a mission, to deal with computer security and therefore also with cryptography, must necessarily pass through the figures of two giants of the last century. We are...
Share on Facebook Share on LinkedIn Share on X

Who are the most famous hackers in history?

We often talk about hackers, but who are the famous hackers that ever existed? Considered by many as eccentric geniuses and computer wizards, by others they have the appearance of...
Share on Facebook Share on LinkedIn Share on X

Underwater cables and the “cyber war of the seabed”. Between control, geopolitics and technology

Author: 5ar0m4n Publishing Date: 11/7/2021 We have often addressed the topic of undersea cables on RHC where we talked about the first submarine cable in history and the last one...
Share on Facebook Share on LinkedIn Share on X

Pig Butchering Scam: How Pig Slaughter Is Becoming an Emotional Addiction Scam

In the interconnected labyrinth of the 21st century, where the desire for authenticity and the search for opportunity dance on the edge of paradox, a dark phenomenon emerges that challenges...
Share on Facebook Share on LinkedIn Share on X

A new Poc Exploit allows Privilege Excalation on Linux using the udisksd daemon

A proof-of-concept (PoC) exploit for a critical vulnerability that allows local privilege escalation has been developed, affecting several major Linux distributions, such as Fedora and SUSE. The vulnerability, tracked as...
Share on Facebook Share on LinkedIn Share on X

Critical Vulnerabilities in SMBClient for macOS. 9.8 out of 10 for Effective RCE

Experts have identified serious vulnerabilities in SMBClient for macOS that affect both user space and the operating system kernel. These vulnerabilities potentially allow remote execution of arbitrary code and disruption...
Share on Facebook Share on LinkedIn Share on X

Discovering Drumrlu. The IaB that does big business between Türkiye and Venezuela

After the Far East and Iran, we continue our series of articles on IAB actors with an actor believed to be based in Europe, in a NATO country. Origin and...
Share on Facebook Share on LinkedIn Share on X

Human Replatforming! Artificial Intelligence Threatens Half of Jobs

The chairman of the American car company Ford, Jim Farley, has released a statement sharp on the future of the job market in the age of artificial intelligence. According to...
Share on Facebook Share on LinkedIn Share on X

123 Stealer is coming! $120 a month subscription to steal any confidential data

A new infostealer emerges from the criminal underground and its name is "123 | Stealer". The author of this software is a hacker who hides under the pseudonym koneko. He...
Share on Facebook Share on LinkedIn Share on X

Pig Butchering Scam: How Pig Slaughter Is Becoming an Emotional Addiction Scam

In the interconnected labyrinth of the 21st century, where the desire for authenticity and the search for opportunity dance on the edge of paradox, a dark phenomenon emerges that challenges...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Webrat Malware Targets Security Researchers with GitHub Exploit Traps
Redazione RHC - 24/12/2025

There’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…

Immagine del sitoCybercrime
A backdoor in NVIDIA code. Three 9.8 bugs plague AI and robotics development systems
Redazione RHC - 24/12/2025

When it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…

Immagine del sitoCybercrime
La Poste Hit by Pro-Russian DDoS Attack During Peak Holiday Season
Redazione RHC - 23/12/2025

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…

Immagine del sitoVulnerability
CVE-2025-47761: FortiClient VPN Zero-Day Exploit Lets Privilege Escalation
Manuel Roccon - 23/12/2025

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…

Immagine del sitoCybercrime
Critical MongoDB Vulnerability Exposed: CVE-2025-14847
Redazione RHC - 23/12/2025

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…