Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
UtiliaCS 320x100
Banner Ancharia Desktop 1 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Attention seniors! Ruthless hacker scam: Criminal hackers steal your life savings. Cybercrime

Attention seniors! Ruthless hacker scam: Criminal hackers steal your life savings.

According to the New York State Attorney General's Office, the primary target of criminal hackers is the elderly and those...
Redazione RHC - 13 September 2025
Quantum algorithm solves complex mathematical problem Cybercrime

Quantum algorithm solves complex mathematical problem

Researchers have used a quantum algorithm for the first time to solve a complex mathematical problem that for over a...
Redazione RHC - 13 September 2025
Sentenced to 4.5 years for piracy: he sold DVDs and films online. Cybercrime

Sentenced to 4.5 years for piracy: he sold DVDs and films online.

A U.S. court sentenced a Memphis resident to four and a half years in prison for selling digital copies of...
Redazione RHC - 13 September 2025
Samsung releases September 2025 security patch, fixing critical vulnerabilities. Cybercrime

Samsung releases September 2025 security patch, fixing critical vulnerabilities.

A September 2025 security update has been released by Samsung to address a critical zero-day vulnerability that is currently being...
Redazione RHC - 13 September 2025
Villager: The Kali Linux and DeepSeek Attack Tool That’s Alarming Experts Cybercrime

Villager: The Kali Linux and DeepSeek Attack Tool That’s Alarming Experts

The experts at Straiker have announced a new tool called Villager, which has been downloaded nearly 10,000 times from the...
Redazione RHC - 13 September 2025
LockBit 5.0 Hacked Again: XOXO from Prague Strikes Again Cybercrime

LockBit 5.0 Hacked Again: XOXO from Prague Strikes Again

A déjà-vu with new implications. In May 2025, the LockBit ransomware collective suffered a severe blow: the defacement of the...
Luca Stivali - 13 September 2025

Zero-Click Attack on Notepad++. HackerHood Tested the Exploit and It Really Works with Little

A dangerous vulnerability has been discovered in the latest version of the popular text editor Notepad++ that allows an attacker togain complete control over the system. The vulnerability has been...
Share on Facebook Share on LinkedIn Share on X

22,000 Sites At Risk: New Motors WordPress Vulnerability Allows Total Hacking

Attackers are actively exploiting a critical privilege escalation vulnerability in the WordPress Motors theme, allowing them to hijack administrator accounts and take complete control of the target site. The malicious activity was...
Share on Facebook Share on LinkedIn Share on X

Qilin & Associates Law Firm: Ransomware Hires Lawyers, Launches “Intimidation Package”

The developers of the Qilin ransomware (recently interviewed by us) offered their partners the help and advice of a team of lawyers, so that they could put pressure on the...
Share on Facebook Share on LinkedIn Share on X

US-Iran Cyberwar: DHS Raises Alarm, American Networks Under Attack

The United States has warned of possible cyber attacks by pro-Iranian groups following a series of airstrikes against Iranian nuclear facilities, as part of the armed conflict between Iran and...
Share on Facebook Share on LinkedIn Share on X

“Jailbreak as a Service” is Coming: 60 Euros a Month to Purchase Cybercrime-Ready AI Systems

According to a report by Cato Networks, cybercriminals continue to actively use LLM patterns in their attacks. Specifically, we are talking about versions of theGrok and Mixtral patterns that have been deliberately modified to bypass...
Share on Facebook Share on LinkedIn Share on X

$200 for Access to an Italian Company! While the Dark Web is doing business, are you ready to defend yourself?

Following the case of the 568 endpoints of an Italian industrial machinery company, another compromised access related to an Italian software engineering company has ended up for sale on an underground forum...
Share on Facebook Share on LinkedIn Share on X

“Cleaning Up” Windows Update! Microsoft Declares War on Drivers Exploited in Ransomware Attacks

Microsoft announced that it will periodically remove outdated drivers from the Windows Update Catalog to reduce risk and improve compatibility. "The goal of this initiative is to provide the best set of...
Share on Facebook Share on LinkedIn Share on X
Cyberspazio: il filo invisibile tra guerra e pace

Cyberspace: The Invisible Thread Between War and Peace

How Iran-Israel’s Digital War Redefines Security, Diplomacy, and the Global Future? Since June 12, a 700% increase in cyber activity has been detected, resulting in a wave of DDoS attacks,...
Share on Facebook Share on LinkedIn Share on X

Kill Switch! Donald Trump’s Digital Weapon Threatening Europe

Donald Trump's return to the White House has becomea painful reminder for Europe of its main digital vulnerability: the "kill switch" effectively controlled by the United States. Political risks that...
Share on Facebook Share on LinkedIn Share on X

Cloudflare Mitigates 7.3 Terabits Per Second Attack. Imagine 9350 HD Movies Downloaded in 45 Seconds

In mid-May 2025, Cloudflare blocked the largest DDoS attack ever recorded: 7.3 terabits per second (Tbps). This event comes shortly after the release of the DDoS Threat Report for Q1...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Villager Framework: AI-Powered Penetration Testing Tool
Redazione RHC - 26/12/2025

Straiker’s AI Research (STAR) team has identified Villager, a native AI-based penetration testing framework developed by the Chinese group Cyberspike . The tool, presented as a red team solution , is designed to fully automate…

Immagine del sitoCybercrime
A $500 Tool Claims to Kill EDRs at Kernel Level: Inside the NtKiller Underground Ad
Redazione RHC - 25/12/2025

An ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…

Immagine del sitoCybercrime
Webrat Malware Targets Security Researchers with GitHub Exploit Traps
Redazione RHC - 24/12/2025

There’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…

Immagine del sitoCybercrime
A backdoor in NVIDIA code. Three 9.8 bugs plague AI and robotics development systems
Redazione RHC - 24/12/2025

When it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…

Immagine del sitoCybercrime
La Poste Hit by Pro-Russian DDoS Attack During Peak Holiday Season
Redazione RHC - 23/12/2025

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…