Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Cyber Offensive Fundamentals 320x200 V0.1
Banner Desktop

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

A critical bug in FortiDDoS-F leads to the execution of unauthorized commands Cybercrime

A critical bug in FortiDDoS-F leads to the execution of unauthorized commands

A security flaw has been discovered in Fortinet's FortiDDoS-F product line that could allow a privileged attacker to execute prohibited...
Redazione RHC - 9 September 2025
In Nepal, people are dying for social media! 19 people lost their lives trying to get Facebook back Cybercrime

In Nepal, people are dying for social media! 19 people lost their lives trying to get Facebook back

In a dramatic reversal, Nepal has lifted the nationwide social media blackout imposed last week after it sparked massive youth...
Redazione RHC - 9 September 2025
Microsoft joins the World Nuclear Association to support nuclear energy Cybercrime

Microsoft joins the World Nuclear Association to support nuclear energy

Microsoft Corporation, according to Datacenter Dynamics, has joined the World Nuclear Association (WNA), an international nonprofit organization based in London...
Redazione RHC - 9 September 2025
Lethal Race Condition for Linux: The Trick That Turns a POSIX Signal Into a Weapon Cybercrime

Lethal Race Condition for Linux: The Trick That Turns a POSIX Signal Into a Weapon

An independent researcher named Alexander Popov has presented a new technique for exploiting a critical vulnerability in the Linux kernel,...
Redazione RHC - 9 September 2025
It’s Not Your PC’s Weak Link, It’s Your Mind: Exercises to Defend Yourself from Hackers Cybercrime

It’s Not Your PC’s Weak Link, It’s Your Mind: Exercises to Defend Yourself from Hackers

Welcome to our second installment! Last week, we explored the battlefield of the human mind, understanding how the coevolution of...
Daniela Farina - 9 September 2025
Google pushes AI as the default search, risking blackouts for independent publishers and blogs. Cybercrime

Google pushes AI as the default search, risking blackouts for independent publishers and blogs.

Google wants to make it easier for users to access AI Mode by allowing them to set it as their...
Redazione RHC - 9 September 2025

Vietnam Hong Ngoc Hospital on Breach Forums: 112,621 Patient and Doctor Profiles Compromised

A serious data breach incident may have recently affected the Hong Ngoc Hospital, a renowned hospital located in Vietnam. The news was disseminated through the BreachForums, a platform known for...
Share on Facebook Share on LinkedIn Share on X

Cambridge University Press & Assessment Ends Up in the DLS of INC Ransomware

In a recent cyberattack, the cybercriminal group known as "INC Ransomware" declared that they had breached the systems of Cambridge University Press & Assessment, employing a double extortion strategy. This...
Share on Facebook Share on LinkedIn Share on X

Identified a POC for the CVE-2024-34102 Vulnerability in Magento / Adobe Commerce

Recently, a Proof of Concept (POC) for a vulnerability identified as CVE-2024-34102, which affects the Magento and Adobe Commerce e-commerce platforms, has been found online. This vulnerability, detected by security...
Share on Facebook Share on LinkedIn Share on X

Cyberpunk 2077: Source Code Stolen?

A malicious actor has claimed to have obtained access to the complete source code of Cyberpunk 2077, the famous role-playing game developed by CD Projekt Red. If confirmed, this claim...
Share on Facebook Share on LinkedIn Share on X

Natohub claims attack on NATO’s COI. Potential data loss of 362 members

A malicious actor released sensitive data (presumably) belonging to COI Cooperation Portal, a sharing and collaborative environmente for non classified NATO documents. This comprehensive portal is dedicated to supporting NATO...
Share on Facebook Share on LinkedIn Share on X

Potential Data Breach Hits Traderie: Roblox Trading Platform

In a concerning turn of events for the online trading community, a threat actor under the pseudonym "victim" has claimed responsibility for leaking a substantial database from Traderie, a popular...
Share on Facebook Share on LinkedIn Share on X

Alleged Leak of the 2020 Israeli Voter Database

In a significant and concerning development, an individual using the alias "mrwan" has allegedly leaked the 2020 Israeli voter database. The personal data of all 6.5 million Israeli voters has...
Share on Facebook Share on LinkedIn Share on X

TeamViewer: Irregularity Detected in Internal IT Environment

TeamViewer, a leading company in the remote access and support software sector, has announced that it has detected an irregularity in its internal IT environment. This event has alarmed both...
Share on Facebook Share on LinkedIn Share on X

RansomHub criminal hackers claim cyber attack on Coca Cola

Today, the RansomHub gang of cybercriminals claimed on their Data Leak Site (DLS) an IT attack on Coca Cola. We still do not know whether this cyber attack actually affected...
Share on Facebook Share on LinkedIn Share on X

Threat Actor “DragonForce” Seeks New Partners 

A recent post on a dark web forum reveals that a cybercriminal group known as "DragonForce" is actively seeking new partners to join their Ransomware-as-a-Service (RaaS) operation. This recruitment drive...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoinnovation
Red Hot Cyber and Hack The Box: together for the CTF at the RHC 2026 conference
Redazione RHC - 21/01/2026

In the Italian and European cybersecurity landscape, few collaborations manage to combine educational vision, technical realism, and community impact as effectively as the partnership announced between Red Hot Cyber and Hack The Box (HTB) for…

Immagine del sitoCybercrime
Everest Ransomware Attacks McDonald’s, 861GB Data Stolen
Redazione RHC - 21/01/2026

Yesterday, the Everest cybercriminal gang claimed responsibility for a cyberattack on McDonald’s on their Data Leak Site (DLS) . From the gang’s post, the cybercriminals claim to have 861GB of data exfiltrated from the company’s…

Immagine del sitoCybercrime
ESXi Zero-Day Exploit: How to Protect Your VMware Environment
Redazione RHC - 20/01/2026

A group of attackers is using a zero-day exploit toolkit to compromise VMware ESXi instances in an uncontrolled manner, taking advantage of multiple vulnerabilities to bypass virtual machine restrictions. The current incident highlights the ongoing…

Immagine del sitoCybercrime
Google Fast Pair Vulnerability: WhisperPair Exposes Millions of Devices
Redazione RHC - 19/01/2026

Researchers from the Cybersecurity and Industrial Cryptography team at KU Leuven have discovered a critical flaw in the Google Fast Pair protocol. The vulnerability allows attackers to hijack control of millions of Bluetooth devices, track…

Immagine del sitoCybercrime
Elon Musk Sues OpenAI for $134 Billion Over AI Betrayal
Redazione RHC - 19/01/2026

Elon Musk has filed a staggering $134 billion in damages in a malicious lawsuit against OpenAI and Microsoft. According to Bloomberg , the latest lawsuit accuses OpenAI of betraying its core mission as a nonprofit…