Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
LECS 320x100 1
Banner Ancharia Desktop 1 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

CrowdStrike Threat Hunting Report 2025: Cybercriminals Use AI for Large-Scale Attacks Cybercrime

CrowdStrike Threat Hunting Report 2025: Cybercriminals Use AI for Large-Scale Attacks

Over 320 companies have been breached by groups linked to North Korea (DPRK) with generative AI-powered attacks. Threat actors are...
Redazione RHC - 8 September 2025
Apple launches Security Research Device 2026 program for security researchers Cybercrime

Apple launches Security Research Device 2026 program for security researchers

Apple has announced that it will accept applications for the Security Research Device Program (SRDP) 2026. Bug hunters interested in...
Redazione RHC - 8 September 2025
Salesloft Drift Incident Expands: Tenable Confirms Customer Data Breach Cybercrime

Salesloft Drift Incident Expands: Tenable Confirms Customer Data Breach

Tenable also suffered a compromise of contact information and support case details for some customers. The company said the incident...
Redazione RHC - 8 September 2025
9.9 out of 10! All SAP S/4HANA systems at risk: Patch now! Cybercrime

9.9 out of 10! All SAP S/4HANA systems at risk: Patch now!

A critical vulnerability, CVE-2025-42957, has been identified in SAP S/4HANA, which has received a CVSS score of 9.9. The flaw...
Redazione RHC - 8 September 2025
Xi Jinping and the Chinese APT’s Ambition Cyberpolitics

Xi Jinping and the Chinese APT’s Ambition

The post-COVID macro political movements, including ongoing conflicts, have prompted a majority of states to shift their medium- to long-term...
Alessio Stefan - 8 September 2025
AI needs a shrink! It can be fooled like humans. Cybercrime

AI needs a shrink! It can be fooled like humans.

Entrepreneur Dan Shapiro ran into an unexpected problem: a popular AI-powered chatbot refused to decrypt company documents, citing copyright infringement....
Redazione RHC - 8 September 2025

Sale of a 0Day RCE Exploit for GLPI HelpDesk

Recently, a user on the Breachforums known as "cisc0" posted an announcement regarding the sale of a 0Day exploit for GLPI HelpDesk. According to the user, this exploit works on...
Share on Facebook Share on LinkedIn Share on X

Play Ransomware Claims Attack on MIPS Technologies

In the last few hours, the Data Leak site of the ransomware gang Play Ransomware has published a new claim: the giant MIPS Technologies (www.mips.com) has been the victim of...
Share on Facebook Share on LinkedIn Share on X

Data Breach: Personal Information of 6K NATO Employees for Sale

On July 17, 2024, user Vadimblyaa posted on a well-known cybercriminal forum, claiming to possess personal information of 6,000 NATO employees, acquired through a data breach that occurred on July...
Share on Facebook Share on LinkedIn Share on X

Alleged Cyber Attack on Sheba Medical Center: Israel’s Largest Hospital

The Sheba Medical Center, the largest hospital in Israel and ranked ninth in the world, has recently fallen victim to an alleged data breach. A pro-Palestinian hacker group known as...
Share on Facebook Share on LinkedIn Share on X

The Hackers Choice – 30 years of hacking without trying to get rich!

Imagine a time before firewalls and ubiquitous encryption, when the digital frontier was wide open for exploration. Hackers weren't criminals, they were pioneers, fueled by an insatiable thirst for knowledge. ...
Share on Facebook Share on LinkedIn Share on X

Rockstar Games Possibly Victim of a Massive Data Leak!

Recently, an alleged data leak has involved Rockstar Games, one of the world's largest video game producers, famous for titles like Grand Theft Auto and Red Dead Redemption. According to...
Share on Facebook Share on LinkedIn Share on X

Potential Data Leak from Google: 1 Million Records Exposed

Recently, a threat actor claimed to have publicly released one million records scraped from Google, raising significant alarm regarding personal data security. The information appeared on an online forum in...
Share on Facebook Share on LinkedIn Share on X

Threat Actor 888 Claims Compromise of BMW (Hong Kong) Customers

Recently, a concerning news story has emerged in the world of cybersecurity. A well-known hacker, identified by the nickname 888, has allegedly leaked sensitive data belonging to BMW customers in...
Share on Facebook Share on LinkedIn Share on X

RHC interviews Ransomcortex, the gang targeting Hospitals. “pay the ransom, we won’t even spare the CEO’s family.”

Ransomcortex is a new cyber ransomware gang that resonates menacingly in the healthcare sector. This group has quickly attracted attention for its specialization in attacks on healthcare facilities, striking four...
Share on Facebook Share on LinkedIn Share on X

Threat Actors IntelBroker Release Alleged Equifax Data on Underground Forum

Recently, a threat actor in an underground forum published an alleged data breach. This incident was revealed by a user named IntelBroker on BreachForums, a notorious online community for cybercriminal...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Cyber Criminals Recruit Insiders: Companies at Risk of Internal Threats
Redazione RHC - 27/12/2025

The cybercriminal community is rapidly increasing its interest in recruiting personnel from within companies . Instead of sophisticated external attacks, criminals are increasingly relying on internal sources— people willing to provide access to company systems…

Immagine del sitoCybercrime
Villager Framework: AI-Powered Penetration Testing Tool
Redazione RHC - 26/12/2025

Straiker’s AI Research (STAR) team has identified Villager, a native AI-based penetration testing framework developed by the Chinese group Cyberspike . The tool, presented as a red team solution , is designed to fully automate…

Immagine del sitoCybercrime
A $500 Tool Claims to Kill EDRs at Kernel Level: Inside the NtKiller Underground Ad
Redazione RHC - 25/12/2025

An ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…

Immagine del sitoCybercrime
Webrat Malware Targets Security Researchers with GitHub Exploit Traps
Redazione RHC - 24/12/2025

There’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…

Immagine del sitoCybercrime
A backdoor in NVIDIA code. Three 9.8 bugs plague AI and robotics development systems
Redazione RHC - 24/12/2025

When it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…