Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

970x120 Olympous
Precedente Successivo

Latest news

Digital Forensics: The Science That Uncovers the Secrets Hidden in Data Cybercrime

Digital Forensics: The Science That Uncovers the Secrets Hidden in Data

Digital Forensics, or computer forensics, is a discipline that deals with the collection, preservation, analysis, and presentation of digital data...
Sandro Sana - July 29, 2025
What are Living off the Land (LotL) attacks? Cyber News

What are Living off the Land (LotL) attacks?

Living off the land means surviving on what you can forage, hunt, or grow, making the most of what nature...
Redazione RHC - July 29, 2025
10 steps to make your company cyber-secure: the RHC guide. Cybercrime

10 steps to make your company cyber-secure: the RHC guide.

In recent weeks, cyber activity on the internet - due to the Russia-Ukraine conflict - has increased significantly. In recent...
Olivia Terragni - July 29, 2025
New macOS bug allows TCC bypass to steal user data Vulnerability

New macOS bug allows TCC bypass to steal user data

Microsoft said that attackers may have exploited a recently patched Transparency, Consent, and Control (TCC) bypass vulnerability to steal sensitive...
Agostino Pellegrino - July 29, 2025
Is Your Smart TV Spying on You? Security Gaps and Critical Vulnerabilities in IoT Devices Vulnerability

Is Your Smart TV Spying on You? Security Gaps and Critical Vulnerabilities in IoT Devices

Networked smart devices are no longer simple helpers, but potential enemies. With every new thermostat or TV connected to the...
Agostino Pellegrino - July 29, 2025
7,000 servers wiped out! Silent Crow and Cyberpartisans BY devastate Aeroflot in a historic cyber raid. Cybercrime

7,000 servers wiped out! Silent Crow and Cyberpartisans BY devastate Aeroflot in a historic cyber raid.

While the West battles ransomware attacks and private companies invest in defensive security, on the other side of the digital...
Luca Stivali - July 29, 2025

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE