Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Mobile
UtiliaCS 970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Hackable restaurant robots could serve sushi… at the attacker’s home. Cybercrime

Hackable restaurant robots could serve sushi… at the attacker’s home.

An independent security specialist, known by the nickname BobDaHacker, discovered security flaws in Pudu Robotics (the world's leading provider of...
Redazione RHC - 6 September 2025
LECS powered by Cyber Evolution: la prima black box NDR completamente Made in Italy Cybercrime

LECS powered by Cyber Evolution: la prima black box NDR completamente Made in Italy

In the current cybersecurity landscape, threats are moving ever faster and more sophisticated. Traditional defense tools are no longer sufficient...
Redazione RHC - 6 September 2025
AI A2 detected 102 0-day bugs and created exploits in Android apps for $1.77 Cybercrime

AI A2 detected 102 0-day bugs and created exploits in Android apps for $1.77

Artificial intelligence systems have been criticized for creating confusing vulnerability reports and inundating open-source developers with irrelevant complaints. But researchers...
Redazione RHC - 6 September 2025
Figure 02, the robot that loads the dishwasher with precision Cybercrime

Figure 02, the robot that loads the dishwasher with precision

California-based company Figure has unveiled another milestone for its humanoid Figure 02: the robot loaded a dishwasher with high precision...
Redazione RHC - 5 September 2025
If Flash is dead, here’s the SVG Assassin! Phishing 2.0 is in high definition. Cybercrime

If Flash is dead, here’s the SVG Assassin! Phishing 2.0 is in high definition.

Cybercriminals have launched a new wave of attacks using SVG files to distribute phishing pages. Experts at VirusTotal have reported...
Redazione RHC - 5 September 2025
The Dark Side of Windows Drivers: How to Steal Data While Ignoring EDR Cybercrime

The Dark Side of Windows Drivers: How to Steal Data While Ignoring EDR

A recent study conducted by Workday's Offensive Security team highlighted a vulnerability in Windows drivers that effectively bypasses Endpoint Detection...
Redazione RHC - 5 September 2025

Facebook Breach 2024: Sensitive User Data Up for Sale by Hacker on Breach Forums

Recently, a threat actor in an underground forum published an alleged data breach. This incident involves the purported exposure of a substantial Facebook user database. The compromised data includes sensitive...
Share on Facebook Share on LinkedIn Share on X

Taylor Swift’s Tour at Risk: Hacker Demands $2 Million from Ticketmaster for 170k Stolen Barcodes

A cyber incident has hit Ticketmaster, with a malicious actor issuing a ransom demand, threatening to release sensitive data unless a payment of $2 million USD is made. The hacker...
Share on Facebook Share on LinkedIn Share on X

Critical Apache Tomcat Vulnerability CVE-2024-34750 Could Bring Your Server to a Halt!

The vulnerability CVE-2024-34750 in Apache Tomcat, as described in the security bulletin AL01/240705/CSIRT-ITA, concerns an issue that can be exploited to overload the server's computing resources, leading to a Denial...
Share on Facebook Share on LinkedIn Share on X

Threat Actors: Alleged Data Breach of Ukraine Traffic Police

Recently, a threat actor in an underground forum published an alleged data breach. The leak purportedly involves sensitive information from the Ukraine traffic police (GAI). The data, spanning millions of...
Share on Facebook Share on LinkedIn Share on X

Serious Vulnerability in Windows Systems: Here’s How an Attacker Can Gain Complete Control of Your PC

A severe security vulnerability has been discovered in MSI Center, a widely used software on Windows systems. This flaw, classified as CVE-2024-37726 and with a CVSS score of 7.8 (high), allows a low-privileged attacker...
Share on Facebook Share on LinkedIn Share on X

Medusa Ransomware claims responsibility for the attack on Harry Perkins Institute

On July 3, 2024, the Australian research institute Harry Perkins was the victim of a ransomware attack claimed by MEDUSA on their official DLS. More than 4.6 Terabytes of CCTV...
Share on Facebook Share on LinkedIn Share on X

A new potential data breach has exposed sensitive information of 70,000 users of the French amusement park Bol D’Air on BreachForum

Fresh Data Breach Exposes Sensitive Information of French Amusement Park Bol D'Air on BreachForum. Currently, we are unable to accurately confirm the veracity of the breach, as no press release...
Share on Facebook Share on LinkedIn Share on X

Potential Data Breach: Sensitive Indonesian Data for Sale on Dark Web

A recent alert in information security landscape has been issued: a threat actor has announced the sale of the Attorney General's Office of the Republic of Indonesia (Kejaksaan Agung Republik Indonesia)...
Share on Facebook Share on LinkedIn Share on X

Threat Actors Post Tennis Tournament Data Breach in Israel

Recently, a threat actor in an underground forum published an alleged data breach. This breach is claimed to have compromised the personal information of thousands of participants and instructors involved...
Share on Facebook Share on LinkedIn Share on X

Threat Actors Post Data Breach of SD Biosensor Healthcare Private Limited

A member of BreachForums recently reported a significant data breach involving SD Biosensor Healthcare Private Limited, a company specializing in medical diagnostics. This breach has exposed sensitive information belonging to...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Cyber Criminals Recruit Insiders: Companies at Risk of Internal Threats
Redazione RHC - 27/12/2025

The cybercriminal community is rapidly increasing its interest in recruiting personnel from within companies . Instead of sophisticated external attacks, criminals are increasingly relying on internal sources— people willing to provide access to company systems…

Immagine del sitoCybercrime
Villager Framework: AI-Powered Penetration Testing Tool
Redazione RHC - 26/12/2025

Straiker’s AI Research (STAR) team has identified Villager, a native AI-based penetration testing framework developed by the Chinese group Cyberspike . The tool, presented as a red team solution , is designed to fully automate…

Immagine del sitoCybercrime
A $500 Tool Claims to Kill EDRs at Kernel Level: Inside the NtKiller Underground Ad
Redazione RHC - 25/12/2025

An ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…

Immagine del sitoCybercrime
Webrat Malware Targets Security Researchers with GitHub Exploit Traps
Redazione RHC - 24/12/2025

There’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…

Immagine del sitoCybercrime
A backdoor in NVIDIA code. Three 9.8 bugs plague AI and robotics development systems
Redazione RHC - 24/12/2025

When it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…