Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
2nd Edition GlitchZone RHC 320x100 2
Banner Ransomfeed 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Critical vulnerability in Adobe Commerce and Magento: the SessionReaper bug Cybercrime

Critical vulnerability in Adobe Commerce and Magento: the SessionReaper bug

Adobe has reported a critical bug (CVE-2025-54236) affecting the Commerce and Magento platforms. Researchers have called this vulnerability SessionReaper and...
Redazione RHC - 10 September 2025
Phishing in the Classroom! 115,000 emails targeted 13,500 organizations with Google Classroom. Cybercrime

Phishing in the Classroom! 115,000 emails targeted 13,500 organizations with Google Classroom.

Check Point researchers have discovered a large-scale active phishing campaign exploiting Google Classroom, a platform trusted by millions of students...
Redazione RHC - 10 September 2025
6 million euros a day! That’s the cost of the cyber attack on Jaguar Land Rover. Cybercrime

6 million euros a day! That’s the cost of the cyber attack on Jaguar Land Rover.

Jaguar Land Rover (JLR), one of Britain's largest car manufacturers, has been hit by a cyber attack that has paralyzed...
Redazione RHC - 10 September 2025
Microsoft Patch Tuesday for September: 81 vulnerabilities and 2 active 0days Cybercrime

Microsoft Patch Tuesday for September: 81 vulnerabilities and 2 active 0days

The recent September Patch Tuesday security update saw Microsoft release a comprehensive series of updates, addressing a total of 81...
Redazione RHC - 10 September 2025
10 out of 10! SAP releases security patches for critical vulnerabilities in NetWeaver. Cybercrime

10 out of 10! SAP releases security patches for critical vulnerabilities in NetWeaver.

SAP released security updates Tuesday aimed at addressing various vulnerabilities. Among these vulnerabilities, three particularly critical ones exist within the...
Redazione RHC - 10 September 2025
Towards the Ouroboros! OpenAI CEO warns: Social media is full of AI bot content. Cybercrime

Towards the Ouroboros! OpenAI CEO warns: Social media is full of AI bot content.

We are making giant strides towards the true ouroboros, or the snake that eats its own tail. We talked about...
Redazione RHC - 10 September 2025
UK digital Crackdown

The UK’s Digital Crackdown: how the government is using our online habits to breach human rights


In today's digital age, the boundaries between lawful expression and governmental overreach are becoming increasingly blurred in the United Kingdom. Citizens are finding themselves under scrutiny, and in some cases,...
Share on Facebook Share on LinkedIn Share on X

Ransomware Gangs weaponize Windows Defender Application Control (WDAC) to disable EDR products.

In the past days we saw that Ransomware Gangs use WDAC to disable EDR products. I have known this type of attack for a year when a guy posts a...
Share on Facebook Share on LinkedIn Share on X

The Story Of Conti Ransomware – The Last Ceremony (Final Episode)

This is the last episode of “The Story Of Conti Ransomware” series, we would finally reach the decline of the group and what this means for the current ransomware landscape....
Share on Facebook Share on LinkedIn Share on X
The Fall of the Human Conscience

The Fall of the Human Conscience: Programming Desensitization

Author: Ashleigh Crause Is our Obsessive use of technology making us insensitive? “Technology - Ashleigh Crause tells us - is, by far, one of the most amazing inventions to date”....
Share on Facebook Share on LinkedIn Share on X

Harley-Davidson Targeted by Cyber ​​Criminals: 888 Claims Data Breach

Recently, a threat actor on an underground forum posted an alleged data breach. According to reports, the famous American company Harley-Davidson has been the victim of a data breach that...
Share on Facebook Share on LinkedIn Share on X

FBI responds to threats and announcement of LockBit 4.0

In the last month of 2024, LockBit has been exodusively talked about. The prominent news is the long-awaited release of the 4.0 program of the most famous RaaS in the...
Share on Facebook Share on LinkedIn Share on X

Brain Chiper claims computer attack on Deloitte. 1 Tera Byte of data

At 14:35 today, the claim of a cyber attack on the consulting giant Deloitte was detected on BrainChiper's Data Leak Site. A countdown is active, marking the time for the...
Share on Facebook Share on LinkedIn Share on X

The Exploit for the RCE on Palo Alto Firewalls is now Online! And let the Administration be for all

A few hours ago on Breach Forum, a threat actor by the name “newplzqibeme” shared a GitHub repository where a python-written exploit for active exploitation of CVE-2024-0012 on PanOS (the...
Share on Facebook Share on LinkedIn Share on X

RHC DarkLab Interviews Interlock Ransomware. “Don’t waste your energy and time. We will do it for you.”

RHC DarkLab has always taken a unique and provocative approach in the fight against cyber threats, summed up by the motto: ‘One must know the Demons to learn how to...
Share on Facebook Share on LinkedIn Share on X

RHC DarkLab Interview Stormous Ransomware. Between history, ideology, techniques and tactics

The Stormous group represents a significant threat in the ransomware landscape: it has an established reputation for its targeted attacks and its overtly pro-Russian ideology. The group may have started...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Villager Framework: AI-Powered Penetration Testing Tool
Redazione RHC - 26/12/2025

Straiker’s AI Research (STAR) team has identified Villager, a native AI-based penetration testing framework developed by the Chinese group Cyberspike . The tool, presented as a red team solution , is designed to fully automate…

Immagine del sitoCybercrime
A $500 Tool Claims to Kill EDRs at Kernel Level: Inside the NtKiller Underground Ad
Redazione RHC - 25/12/2025

An ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…

Immagine del sitoCybercrime
Webrat Malware Targets Security Researchers with GitHub Exploit Traps
Redazione RHC - 24/12/2025

There’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…

Immagine del sitoCybercrime
A backdoor in NVIDIA code. Three 9.8 bugs plague AI and robotics development systems
Redazione RHC - 24/12/2025

When it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…

Immagine del sitoCybercrime
La Poste Hit by Pro-Russian DDoS Attack During Peak Holiday Season
Redazione RHC - 23/12/2025

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…