Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Crowdstrike 320×100
Crowdstriker 970×120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

NightshadeC2, the new botnet that uses unconventional methods to bypass protection Cybercrime

NightshadeC2, the new botnet that uses unconventional methods to bypass protection

eSentire has reported the discovery of a new botnet called NightshadeC2, which uses unconventional methods to bypass protection and sandboxes....
Redazione RHC - 9 September 2025
Cephalus is coming! The ransomware group that attacks via DLL replacement. Cybercrime

Cephalus is coming! The ransomware group that attacks via DLL replacement.

In mid-August, researchers encountered the Cephalus ransomware in two separate incidents. Among recent outbreaks of families like Crux and KawaLocker,...
Redazione RHC - 8 September 2025
WhatsApp and Apple in emergency: DNG bug allows remote control without clicking Cybercrime

WhatsApp and Apple in emergency: DNG bug allows remote control without clicking

On August 20, Apple released an unscheduled security update for all major operating systems: iOS, iPadOS, macOS, and other platforms....
Redazione RHC - 8 September 2025
Stealerium and Phantom: How Open-Source Infostealers Are Taking the World by storm Cybercrime

Stealerium and Phantom: How Open-Source Infostealers Are Taking the World by storm

Researchers at Proofpoint, a leader in cybersecurity and information protection, have detected a worrying increase in the use of open-source...
Redazione RHC - 8 September 2025
The largest pirate sports streaming network has been shut down. Cybercrime

The largest pirate sports streaming network has been shut down.

Egyptian authorities and the Alliance for Creativity and Entertainment (ACE) say they have shut down Streameast, the largest illegal sports...
Redazione RHC - 8 September 2025
Criticism of XChat: The new encrypted messaging service is no good Cybercrime

Criticism of XChat: The new encrypted messaging service is no good

The social network X, formerly known as Twitter, has begun rolling out a new encrypted messaging service called XChat. It...
Redazione RHC - 8 September 2025

A Threat Actors Posts Update on Luxottica’s 2021 Data Breach

Recently, a threat actor in a clandestine forum posted an update on the 2021 data breach concerning the giant Luxottica, one of the world's largest eyewear companies. According to the...
Share on Facebook Share on LinkedIn Share on X

The dark side of the Windows Command Prompt: how malicious commands can replace legitimate ones

If you choose to read this article, please note that it will not discuss a vulnerability or a bug, but rather an intended behavior of Windows Command Prompt which, in...
Share on Facebook Share on LinkedIn Share on X

RHC interviews RADAR and DISPOSSESSOR: “When it comes to security, the best defense is a good offense.”

In our usual underground analysis activities, we came into contact with the cyber gang DISPOSSESSOR, which came to attention in February 2024 in the cyber threat landscape. Accessing their Data...
Share on Facebook Share on LinkedIn Share on X

IntelBroker Strikes Again: Unauthorized Access to Two Major American Companies Up for Sale

IntelBroker strikes again, announcing the sale of unauthorized access to two major American companies, each with revenues reaching hundreds of billions. This announcement was made public through a post on...
Share on Facebook Share on LinkedIn Share on X

Exposed the Data of 3,379 Spanish Doctors! When Fraud Becomes “On-Target”

Recently, a threat actor in an underground forum called Breach Forums published an alleged data breach. The post claims to have exposed the names, departments, and emails of 3,379 Spanish...
Share on Facebook Share on LinkedIn Share on X

The other side of cybersecurity: stress and burnout are “by design” in domain experts

We often talk about cyber security and the importance of a complete cyber program today. Today, however, we will focus on analyzing another important point in the profession of the...
Share on Facebook Share on LinkedIn Share on X

Musk’s Supercomputer in Memphis is ready! 100,000 liquid-cooled Nvidia H1s.

Elon Musk, who simultaneously heads six innovative companies-Tesla, SpaceX, Starlink, X (formerly known as Twitter), Neuralink, and xAI-is not stopping there. He recently announced that xAI has begun training its...
Share on Facebook Share on LinkedIn Share on X

Microsoft releases USB tool to fix CrowdStrike BSOD problem on Windows 10 and 11

Microsoft has released a tool for system administrators to simplify the process of fixing the blue screen of death (BSOD) on Windows 10 and 11 computers. The solution involves the...
Share on Facebook Share on LinkedIn Share on X

PoC Released for SQL Injection Without Authentication on WordPress WZone Plugin

A proof of concept (PoC) for a critical vulnerability identified as CVE-2024-33544 has recently been released. This vulnerability involves an unauthenticated SQL injection, which poses a serious threat to the...
Share on Facebook Share on LinkedIn Share on X

Threat Actor IntelBroker Exposes Rapid4Cloud Data on Breach Forums

In the world of cybersecurity, news of data breaches is commonplace. Recently, a new alleged breach has made waves: the moderator of BreachForums, known as IntelBroker, has claimed to have...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Cyber Criminals Recruit Insiders: Companies at Risk of Internal Threats
Redazione RHC - 27/12/2025

The cybercriminal community is rapidly increasing its interest in recruiting personnel from within companies . Instead of sophisticated external attacks, criminals are increasingly relying on internal sources— people willing to provide access to company systems…

Immagine del sitoCybercrime
Villager Framework: AI-Powered Penetration Testing Tool
Redazione RHC - 26/12/2025

Straiker’s AI Research (STAR) team has identified Villager, a native AI-based penetration testing framework developed by the Chinese group Cyberspike . The tool, presented as a red team solution , is designed to fully automate…

Immagine del sitoCybercrime
A $500 Tool Claims to Kill EDRs at Kernel Level: Inside the NtKiller Underground Ad
Redazione RHC - 25/12/2025

An ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…

Immagine del sitoCybercrime
Webrat Malware Targets Security Researchers with GitHub Exploit Traps
Redazione RHC - 24/12/2025

There’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…

Immagine del sitoCybercrime
A backdoor in NVIDIA code. Three 9.8 bugs plague AI and robotics development systems
Redazione RHC - 24/12/2025

When it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…