Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320×100
Banner Ransomfeed 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Google fined €2.95 billion for abusing its dominant position Cybercrime

Google fined €2.95 billion for abusing its dominant position

The European Commission has fined Google €2.95 billion for abusing its dominant position in the digital advertising market. The regulator...
Redazione RHC - 7 September 2025
Discover the Dark Web: Access, Secrets, and Helpful Links to the Onion Network Cybercrime

Discover the Dark Web: Access, Secrets, and Helpful Links to the Onion Network

The Dark Web is a part of the internet that cannot be reached with standard browsers (Chrome, Firefox, Edge). To...
Redazione RHC - 6 September 2025
Geoffrey Hinton’s shocking revelations: Better to trust China than Zuckerberg! Cybercrime

Geoffrey Hinton’s shocking revelations: Better to trust China than Zuckerberg!

Geoffrey Hinton, known as the "godfather of artificial intelligence," recently shared his thoughts in a panel with the Financial Times....
Redazione RHC - 6 September 2025
Jupiter, the exascale supercomputer that aims to revolutionize AI in Europe Cybercrime

Jupiter, the exascale supercomputer that aims to revolutionize AI in Europe

The Jupiter supercomputer, inaugurated at the Jülich Supercomputing Center in Germany, represents a milestone for Europe. It is the continent's...
Redazione RHC - 6 September 2025
38 million Italian phone numbers for sale on the dark web. It’s smishing! Cybercrime

38 million Italian phone numbers for sale on the dark web. It’s smishing!

Seven out of ten Italians have their phone numbers included in this database. But what does it mean to have...
Redazione RHC - 6 September 2025
Apitor, the first robot that helps children do their homework and the whistleblower for China Cybercrime

Apitor, the first robot that helps children do their homework and the whistleblower for China

The U.S. Department of Justice has filed a lawsuit against Apitor Technology, accusing it of secretly collecting children's location data...
Redazione RHC - 6 September 2025

Alleged NATO Data BreachAlleged NATO Data Breach: 643 CSV Files with User Data and Server Details Leaked

A threat actor claims to have leaked sensitive data from NATO - TIDE (Think-Tank for Information Decision and Execution Superiority). NATO-TIDE (Think-Tank for Information Decision and Execution Superiority) is a...
Share on Facebook Share on LinkedIn Share on X

Access to UK Accounting System for Sale: 600 Clients and 1TB of Data at Risk

A malicious actor is allegedly selling access to an RDWeb system in the United Kingdom, belonging to an accounting firm. This breach represents a serious threat to the security of...
Share on Facebook Share on LinkedIn Share on X

Ticketmaster Breach: 30,000 Free Tickets Released

After claiming to have stolen 170,000 tickets for Taylor Swift's ERAS Tour, the hacker group Sp1d3rHunters today announced they have distributed over 30,000 more tickets for high-profile events. The allegedly...
Share on Facebook Share on LinkedIn Share on X

China: 7.5 Million Tourist Data Stolen!

On the morning of July 6, 2024, a user known as "BlackKing" revealed a significant data breach involving a Chinese travel and tourism platform on a hacking forum. This information...
Share on Facebook Share on LinkedIn Share on X

Critical Vulnerability in MongoDB Compass: CVE-2024-6376 Exposes Systems to Code Injection Risks

A critical security vulnerability, identified as CVE-2024-6376, has been discovered in MongoDB Compass, a widely-used graphical interface for MongoDB data management. This security flaw could have serious repercussions, including data...
Share on Facebook Share on LinkedIn Share on X

Latvian Government Database Compromised: Over 1.6 Million Government Data Lines!

A malicious actor has claimed to have leaked a database containing over 1.6 million lines of data from the Latvian government. The data breach, dated July 7, 2024, includes all...
Share on Facebook Share on LinkedIn Share on X

Threat Actors Steal 5.90 GB of Sensitive Data from the Fiscalía General del Estado de Veracruz!

In an era where cybersecurity has become crucial for protecting sensitive data, a recent leak has revealed an alleged security breach at the Fiscalía General del Estado de Veracruz. A...
Share on Facebook Share on LinkedIn Share on X

Dangerous 0day Windows LPE Vulnerability for Sale in the Underground

A malicious actor, under the name "tikila", has posted an advertisement on a hacking forum for the sale of a local privilege escalation (LPE) vulnerability for Windows. According to the...
Share on Facebook Share on LinkedIn Share on X

Europol Breached: Secret Documents for Sale on the Dark Web

July 6, 2024: A well-known user of the BreachForums, IntelBroker, has recently announced the sale of a collection of crypto-related documents stolen from Europol's EPE platform. The data breach, which...
Share on Facebook Share on LinkedIn Share on X

The New RockYou2024 Collection has been published! 10 Billion Credentials Compromised

Everyone involved with CTF has used the infamous rockyou.txt wordlist at least once, mainly to perform password cracking activities. The file is a list of 14 million unique passwords originating from the 2009...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Cyber Criminals Recruit Insiders: Companies at Risk of Internal Threats
Redazione RHC - 27/12/2025

The cybercriminal community is rapidly increasing its interest in recruiting personnel from within companies . Instead of sophisticated external attacks, criminals are increasingly relying on internal sources— people willing to provide access to company systems…

Immagine del sitoCybercrime
Villager Framework: AI-Powered Penetration Testing Tool
Redazione RHC - 26/12/2025

Straiker’s AI Research (STAR) team has identified Villager, a native AI-based penetration testing framework developed by the Chinese group Cyberspike . The tool, presented as a red team solution , is designed to fully automate…

Immagine del sitoCybercrime
A $500 Tool Claims to Kill EDRs at Kernel Level: Inside the NtKiller Underground Ad
Redazione RHC - 25/12/2025

An ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…

Immagine del sitoCybercrime
Webrat Malware Targets Security Researchers with GitHub Exploit Traps
Redazione RHC - 24/12/2025

There’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…

Immagine del sitoCybercrime
A backdoor in NVIDIA code. Three 9.8 bugs plague AI and robotics development systems
Redazione RHC - 24/12/2025

When it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…