Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
UtiliaCS 320x100
2nd Edition GlitchZone RHC 970x120 2

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Beware of dissatisfied employees! Four years in prison for bringing his former company to its knees. Cybercrime

Beware of dissatisfied employees! Four years in prison for bringing his former company to its knees.

A former employee has been convicted of intentionally committing digital sabotage against his employer. Davis Lu, 55, a Chinese citizen...
Redazione RHC - 23 August 2025
When a VPN Becomes a Spy! FreeVPN.One Takes Unauthorized Screenshots Cybercrime

When a VPN Becomes a Spy! FreeVPN.One Takes Unauthorized Screenshots

Koi Security experts warn that the behavior of the popular Chrome extension FreeVPN.One has recently changed. It has begun secretly...
Redazione RHC - 23 August 2025
RapperBot DDoS botnet dismantled and alleged developer arrested Cybercrime

RapperBot DDoS botnet dismantled and alleged developer arrested

The U.S. Department of Justice has indicted the alleged developer and administrator of the RapperBot DDoS botnet, which was leased...
Redazione RHC - 23 August 2025
The “My Wife” case and the challenges of digital responsibility: privacy, revenge porn, and the role of platforms Cybercrime

The “My Wife” case and the challenges of digital responsibility: privacy, revenge porn, and the role of platforms

The recent incident involving the Facebook group "My Wife," active since 2019 and boasting over 32,000 members, highlights a dynamic...
Paolo Galdieri - 23 August 2025
Google’s 2025 Performance Review: Fewer Bugs, More Vibe Coding Cybercrime

Google’s 2025 Performance Review: Fewer Bugs, More Vibe Coding

For Google employees, "staying ahead of the curve" means not just developing AI, but also being able to use it...
Redazione RHC - 23 August 2025
$20 million in zero-day exploits from broker Advanced Security Solutions Cybercrime

$20 million in zero-day exploits from broker Advanced Security Solutions

Advanced Security Solutions, based in the United Arab Emirates, was founded this month and is offering up to $20 million...
Redazione RHC - 22 August 2025

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Browser-in-the-Browser Phishing Attack: How to Protect Yourself
Manuel Roccon - 29/12/2025

This article analyzes a recent and sophisticated phishing campaign that uses the Browser-in-the-Browser (BitB) technique to steal credentials, particularly those from services like Microsoft 365. The BitB attack is notable for its ability to generate…

Immagine del sitoCybercrime
Critical WebKit Vulnerability Exposes iOS Devices to Code Execution
Redazione RHC - 29/12/2025

A new report details a critical vulnerability discovered by security researcher Joseph Goydish in Apple’s WebKit engine. This security flaw, if exploited in conjunction with other exploits, could allow attackers to execute arbitrary code on…

Immagine del sitoCybercrime
Xspeeder Devices Hit by AI-Discovered Zero-Day Vulnerability CVE-2025-54322
Redazione RHC - 29/12/2025

When it comes to cybersecurity, it’s easy to fall into the trap of thinking that problems are always far away, that they only affect others. But the reality is that a vulnerability is always around…

Immagine del sitoCybercrime
Job Scams on Social Media: How to Avoid Fake Remote Job Offers
Redazione RHC - 29/12/2025

Fraudulent job ads promising easy money and remote work continue to flood social media, particularly in the Middle East and North Africa . Under the guise of part-time jobs that require no experience , scammers…

Immagine del sitoCybercrime
Cyber Criminals Recruit Insiders: Companies at Risk of Internal Threats
Redazione RHC - 27/12/2025

The cybercriminal community is rapidly increasing its interest in recruiting personnel from within companies . Instead of sophisticated external attacks, criminals are increasingly relying on internal sources— people willing to provide access to company systems…