Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Redhotcyber Banner Sito 320x100px Uscita 101125
UtiliaCS 970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Happy Birthday, Super Mario Bros.! 40 years of a game that revolutionized the world. Cybercrime

Happy Birthday, Super Mario Bros.! 40 years of a game that revolutionized the world.

It's been exactly four decades since the release of the legendary Super Mario Bros., a project that changed the video...
Redazione RHC - 14 September 2025
China Makes Historic Turn: Mandatory Labeling of AI-Created Content Cybercrime

China Makes Historic Turn: Mandatory Labeling of AI-Created Content

A series of Chinese national standards came into force on September 1st, aimed at redefining rules, responsibilities, and controls in...
Redazione RHC - 14 September 2025
Satellite SIEM: US Defense Develops AI to Defend Satellites from Hackers Cybercrime

Satellite SIEM: US Defense Develops AI to Defend Satellites from Hackers

U.S. defense contractors are developing an artificial intelligence tool called Cyber Resilience On-Orbit (CROO) to detect cyber attacks on satellites...
Redazione RHC - 13 September 2025
OpenAI and Microsoft reach agreement to transform into a public utility company. Cybercrime

OpenAI and Microsoft reach agreement to transform into a public utility company.

OpenAI has entered into a memorandum of understanding with Microsoft to review its partnership, which could lead to the company's...
Redazione RHC - 13 September 2025
Nebius, formerly Yandex, signs billion-dollar AI deal with Microsoft Cybercrime

Nebius, formerly Yandex, signs billion-dollar AI deal with Microsoft

Nebius (formerly Yandex) has announced a major agreement with Microsoft Corporation to lease graphics processing units (GPUs) for artificial intelligence....
Redazione RHC - 13 September 2025
Attention seniors! Ruthless hacker scam: Criminal hackers steal your life savings. Cybercrime

Attention seniors! Ruthless hacker scam: Criminal hackers steal your life savings.

According to the New York State Attorney General's Office, the primary target of criminal hackers is the elderly and those...
Redazione RHC - 13 September 2025

IntelBroker Takes Control of BreachForums: A New Chapter in Cybercrime Management

IntelBroker Takes Control of BreachForums: A New Chapter in Cybercrime Management IntroductionThe recent acquisition of BreachForums by IntelBroker marks a significant shift in the landscape of cybercrime. This transition of...
Share on Facebook Share on LinkedIn Share on X

Donald Trump’s campaign under attack! Documents and internal communications exfiltrated

After the European elections unfolded, geopolitical attentions shifted to the U.S. election campaign, one of the most dynamic in recent years recently with the Democrats' recent changeover with Harris as...
Share on Facebook Share on LinkedIn Share on X

RipperSec claims DDoS attack on Ferrari

Recently the Hacktivist Group "RipperSec" claimed to have attacked Ferrari's global site in the name of justice for Palestine. The hacktivist group known as 'RipperSec' claimed responsibility for a DDoS...
Share on Facebook Share on LinkedIn Share on X

NSO Group targeted! BlackMeta attacks Spyware maker’s central domain

The Pro-Palestinian group BlackMeta (or DarkMeta) announced on August 1, 2024, on their official telegram channel that they conducted a destructive attack on the NSO group's infrastructure, including the central...
Share on Facebook Share on LinkedIn Share on X

Echelon Stealer: The Open Source Malware

Echelon Stealer is an infostealer malware that was first discovered in 2018 and is still active. Currently shared as an open-source tool on GitHub, Echelon Stealer offers various advanced features...
Share on Facebook Share on LinkedIn Share on X

Ferrari avoids deepfake scam! An executive unmasks the CEO’s fake audio messages

In an incident earlier this month, a Ferrari executive found himself receiving unusual messages that appeared to come from the company's CEO, Benedetto Vigna. The messages came via WhatsApp, owned...
Share on Facebook Share on LinkedIn Share on X

The Ransomware Group Ransomexx Claims Attack on Liteon

On July 26, 2024, the ransomware group Ransomexx publicly claimed responsibility for an attack against Liteon, a giant in the electronic components sector. This attack is further evidence of the...
Share on Facebook Share on LinkedIn Share on X

A Threat Actors Posts Update on Luxottica’s 2021 Data Breach

Recently, a threat actor in a clandestine forum posted an update on the 2021 data breach concerning the giant Luxottica, one of the world's largest eyewear companies. According to the...
Share on Facebook Share on LinkedIn Share on X

The dark side of the Windows Command Prompt: how malicious commands can replace legitimate ones

If you choose to read this article, please note that it will not discuss a vulnerability or a bug, but rather an intended behavior of Windows Command Prompt which, in...
Share on Facebook Share on LinkedIn Share on X

RHC interviews RADAR and DISPOSSESSOR: “When it comes to security, the best defense is a good offense.”

In our usual underground analysis activities, we came into contact with the cyber gang DISPOSSESSOR, which came to attention in February 2024 in the cyber threat landscape. Accessing their Data...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoinnovation
Red Hot Cyber and Hack The Box: together for the CTF at the RHC 2026 conference
Redazione RHC - 21/01/2026

In the Italian and European cybersecurity landscape, few collaborations manage to combine educational vision, technical realism, and community impact as effectively as the partnership announced between Red Hot Cyber and Hack The Box (HTB) for…

Immagine del sitoCybercrime
Everest Ransomware Attacks McDonald’s, 861GB Data Stolen
Redazione RHC - 21/01/2026

Yesterday, the Everest cybercriminal gang claimed responsibility for a cyberattack on McDonald’s on their Data Leak Site (DLS) . From the gang’s post, the cybercriminals claim to have 861GB of data exfiltrated from the company’s…

Immagine del sitoCybercrime
ESXi Zero-Day Exploit: How to Protect Your VMware Environment
Redazione RHC - 20/01/2026

A group of attackers is using a zero-day exploit toolkit to compromise VMware ESXi instances in an uncontrolled manner, taking advantage of multiple vulnerabilities to bypass virtual machine restrictions. The current incident highlights the ongoing…

Immagine del sitoCybercrime
Google Fast Pair Vulnerability: WhisperPair Exposes Millions of Devices
Redazione RHC - 19/01/2026

Researchers from the Cybersecurity and Industrial Cryptography team at KU Leuven have discovered a critical flaw in the Google Fast Pair protocol. The vulnerability allows attackers to hijack control of millions of Bluetooth devices, track…

Immagine del sitoCybercrime
Elon Musk Sues OpenAI for $134 Billion Over AI Betrayal
Redazione RHC - 19/01/2026

Elon Musk has filed a staggering $134 billion in damages in a malicious lawsuit against OpenAI and Microsoft. According to Bloomberg , the latest lawsuit accuses OpenAI of betraying its core mission as a nonprofit…