Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Enterprise BusinessLog 320x200 1
Banner Desktop

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Underwater warfare is upon us! Will Chinese cable cutters pose a global threat? Cybercrime

Underwater warfare is upon us! Will Chinese cable cutters pose a global threat?

The new cable cutter, developed by the China Shipbuilding Research Center, is designed for use on advanced submarines such as...
Redazione RHC - 5 September 2025
$16 billion in stolen Apple, Meta, and Google credentials up for sale for $121,000 Cybercrime

$16 billion in stolen Apple, Meta, and Google credentials up for sale for $121,000

The Darklab team, Red Hot Cyber's community of threat intelligence experts, has identified an ad on the dark web marketplace...
Redazione RHC - 5 September 2025
The European Union General Court “upholds” the transfer of personal data to the United States. For now Cybercrime

The European Union General Court “upholds” the transfer of personal data to the United States. For now

April 1st wasn't an April Fool's joke: the first hearing in the Latombe v. Commission case was adjourned to September...
Stefano Gazzella - 5 September 2025
Android Colabrodo Edition: 120 vulnerabilities and two zero-days fixed Cybercrime

Android Colabrodo Edition: 120 vulnerabilities and two zero-days fixed

Google developers have released security updates for Android that address 120 operating system vulnerabilities. Two of these vulnerabilities, according to...
Redazione RHC - 5 September 2025
Chess.com Data Breach! Free Services for Affected Users Cybercrime

Chess.com Data Breach! Free Services for Affected Users

Chess.com, the online chess giant, has reportedly suffered a data breach that exposed the personal information of 4,541 individuals, according...
Redazione RHC - 5 September 2025
From Commodore 64 to GitHub! Gates and Allen’s BASIC goes open source after 48 years. Cybercrime

From Commodore 64 to GitHub! Gates and Allen’s BASIC goes open source after 48 years.

Microsoft has officially released the source code for its first version of BASIC for the MOS 6502 processor. For decades,...
Redazione RHC - 4 September 2025

Juniper Networks Releases Security Updates for a Critical 10.0 Vulnerability

Juniper Networks has recently announced the release of out-of-band security updates to address a severe vulnerability that could lead to an authentication bypass in some of its routers. This vulnerability,...
Share on Facebook Share on LinkedIn Share on X

Allegedly Data Breach: Kemenkumham Email Credentials Compromised

A significant data breach has involved the Ministry of Law and Human Rights (Kemenkumham) in Indonesia. According to a post on a hacker forum, a threat actor under the pseudonym...
Share on Facebook Share on LinkedIn Share on X

Coinbase USA: Threat Actor Claims to Sell Database of 600,000 Users

In the past few hours, a new and alarming cyber threat has emerged. A threat actor has claimed to possess and intends to sell a database containing information on 600,000...
Share on Facebook Share on LinkedIn Share on X

A Brief History of Artificial Intelligence: From Alan Turing to Generative AI

Artificial Intelligence (AI) is in the Spotlight Today, Generating Unprecedented Interest and Debate. However, it's important to recognize that this revolutionary technology has a rich history spanning over seventy years...
Share on Facebook Share on LinkedIn Share on X

The Virginia Department of Elections database may have been hacked and is online on the dark web

A serious security incident appears to have hit the Virginia Department of Elections, causing the unauthorised dissemination of a large election database. The attack, claimed by a user known as...
Share on Facebook Share on LinkedIn Share on X

Vietnam Hong Ngoc Hospital on Breach Forums: 112,621 Patient and Doctor Profiles Compromised

A serious data breach incident may have recently affected the Hong Ngoc Hospital, a renowned hospital located in Vietnam. The news was disseminated through the BreachForums, a platform known for...
Share on Facebook Share on LinkedIn Share on X

Cambridge University Press & Assessment Ends Up in the DLS of INC Ransomware

In a recent cyberattack, the cybercriminal group known as "INC Ransomware" declared that they had breached the systems of Cambridge University Press & Assessment, employing a double extortion strategy. This...
Share on Facebook Share on LinkedIn Share on X

Identified a POC for the CVE-2024-34102 Vulnerability in Magento / Adobe Commerce

Recently, a Proof of Concept (POC) for a vulnerability identified as CVE-2024-34102, which affects the Magento and Adobe Commerce e-commerce platforms, has been found online. This vulnerability, detected by security...
Share on Facebook Share on LinkedIn Share on X

Cyberpunk 2077: Source Code Stolen?

A malicious actor has claimed to have obtained access to the complete source code of Cyberpunk 2077, the famous role-playing game developed by CD Projekt Red. If confirmed, this claim...
Share on Facebook Share on LinkedIn Share on X

Natohub claims attack on NATO’s COI. Potential data loss of 362 members

A malicious actor released sensitive data (presumably) belonging to COI Cooperation Portal, a sharing and collaborative environmente for non classified NATO documents. This comprehensive portal is dedicated to supporting NATO...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Cyber Criminals Recruit Insiders: Companies at Risk of Internal Threats
Redazione RHC - 27/12/2025

The cybercriminal community is rapidly increasing its interest in recruiting personnel from within companies . Instead of sophisticated external attacks, criminals are increasingly relying on internal sources— people willing to provide access to company systems…

Immagine del sitoCybercrime
Villager Framework: AI-Powered Penetration Testing Tool
Redazione RHC - 26/12/2025

Straiker’s AI Research (STAR) team has identified Villager, a native AI-based penetration testing framework developed by the Chinese group Cyberspike . The tool, presented as a red team solution , is designed to fully automate…

Immagine del sitoCybercrime
A $500 Tool Claims to Kill EDRs at Kernel Level: Inside the NtKiller Underground Ad
Redazione RHC - 25/12/2025

An ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…

Immagine del sitoCybercrime
Webrat Malware Targets Security Researchers with GitHub Exploit Traps
Redazione RHC - 24/12/2025

There’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…

Immagine del sitoCybercrime
A backdoor in NVIDIA code. Three 9.8 bugs plague AI and robotics development systems
Redazione RHC - 24/12/2025

When it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…