Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...
New macOS bug allows TCC bypass to steal user data
New Phishing Attacks Using Fake Zoom Meetings Aim to Steal Corporate Credentials
Is Your Smart TV Spying on You? Security Gaps and Critical Vulnerabilities in IoT Devices
7,000 servers wiped out! Silent Crow and Cyberpartisans BY devastate Aeroflot in a historic cyber raid.
Boys recruited for murders and robberies: the FBI’s disturbing alert on the IRL Com group
Zero-click exploits: the new invisible frontier of cyber attacks

New macOS bug allows TCC bypass to steal user data
Redazione RHC - July 28th, 2025
Microsoft said that attackers may have exploited a recently patched Transparency, Consent, and Control (TCC) bypass vulnerability to steal sensitive information from macOS users, including cached Apple Intelligence data. TCC...

New Phishing Attacks Using Fake Zoom Meetings Aim to Steal Corporate Credentials
Redazione RHC - July 28th, 2025
A phishing attack that mimics an urgent Zoom meeting is being used by cybercriminals to steal corporate credentials, using a fake interface so realistic it's nearly indistinguishable from a real...

Is Your Smart TV Spying on You? Security Gaps and Critical Vulnerabilities in IoT Devices
Redazione RHC - July 28th, 2025
Networked smart devices are no longer simple helpers, but potential enemies. With every new thermostat or TV connected to the internet, a new flaw opens up in the digital infrastructure...

7,000 servers wiped out! Silent Crow and Cyberpartisans BY devastate Aeroflot in a historic cyber raid.
Luca Stivali - July 28th, 2025
While the West battles ransomware attacks and private companies invest in defensive security, on the other side of the digital front, the war is being played out asymmetrically. On July...

Boys recruited for murders and robberies: the FBI’s disturbing alert on the IRL Com group
Redazione RHC - July 28th, 2025
The FBI has issued a warning about a rapidly growing threat from IRL Com, a subgroup of the underground group The Com that actively recruits teenagers to commit real-world crimes....

Zero-click exploits: the new invisible frontier of cyber attacks
Redazione RHC - July 28th, 2025
In recent years, cybersecurity has seen the emergence of increasingly sophisticated threats, capable of compromising devices and personal data without the user taking any action. Among these, so-called zero-click exploits...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

