Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Enterprise BusinessLog 320x200 1
HackTheBox 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Mozilla Fixes Dangerous RCE Bug in Firefox 142 Cybercrime

Mozilla Fixes Dangerous RCE Bug in Firefox 142

Mozilla has fixed several high-severity security bugs with the release of Firefox 142, preventing attackers from remotely executing code of...
Redazione RHC - 21 August 2025
Spyware under fire! Apple releases a critical patch for a 0day used on iOS and iPadOS Cybercrime

Spyware under fire! Apple releases a critical patch for a 0day used on iOS and iPadOS

Apple has released an urgent security patch for iOS and iPadOS to address a critical zero-day vulnerability. This vulnerability, identified...
Redazione RHC - 21 August 2025
LastPass, 1Password, and Keeper under fire! Widespread zero-day bugs detected, putting millions of users at risk. Cybercrime

LastPass, 1Password, and Keeper under fire! Widespread zero-day bugs detected, putting millions of users at risk.

A cybersecurity expert has identified zero-day vulnerabilities affecting eleven popular password managers, potentially putting tens of millions of users at...
Redazione RHC - 21 August 2025
Zero-Day RCE Exploit for Windows Selling for $125,000: How to Protect Yourself Cybercrime

Zero-Day RCE Exploit for Windows Selling for $125,000: How to Protect Yourself

Browsing the dark web can reveal disturbing and alarming ads for those involved in cybersecurity. Recently, we noticed a post...
Redazione RHC - 21 August 2025
Nike Under Fire! IT Infrastructure Access for Sale from an Initial Access Broker Cybercrime

Nike Under Fire! IT Infrastructure Access for Sale from an Initial Access Broker

An Initial Access Broker is selling access to Nike USA servers on a popular underground forum. A recent post on...
Redazione RHC - 20 August 2025
A critical bug in Ollama allows for model replacement attacks Cybercrime

A critical bug in Ollama allows for model replacement attacks

A vulnerability in the popular AI model launcher Ollama opened the door to drive-by attacks, allowing attackers to silently interfere...
Redazione RHC - 20 August 2025

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Browser-in-the-Browser Phishing Attack: How to Protect Yourself
Manuel Roccon - 29/12/2025

This article analyzes a recent and sophisticated phishing campaign that uses the Browser-in-the-Browser (BitB) technique to steal credentials, particularly those from services like Microsoft 365. The BitB attack is notable for its ability to generate…

Immagine del sitoCybercrime
Critical WebKit Vulnerability Exposes iOS Devices to Code Execution
Redazione RHC - 29/12/2025

A new report details a critical vulnerability discovered by security researcher Joseph Goydish in Apple’s WebKit engine. This security flaw, if exploited in conjunction with other exploits, could allow attackers to execute arbitrary code on…

Immagine del sitoCybercrime
Xspeeder Devices Hit by AI-Discovered Zero-Day Vulnerability CVE-2025-54322
Redazione RHC - 29/12/2025

When it comes to cybersecurity, it’s easy to fall into the trap of thinking that problems are always far away, that they only affect others. But the reality is that a vulnerability is always around…

Immagine del sitoCybercrime
Job Scams on Social Media: How to Avoid Fake Remote Job Offers
Redazione RHC - 29/12/2025

Fraudulent job ads promising easy money and remote work continue to flood social media, particularly in the Middle East and North Africa . Under the guise of part-time jobs that require no experience , scammers…

Immagine del sitoCybercrime
Cyber Criminals Recruit Insiders: Companies at Risk of Internal Threats
Redazione RHC - 27/12/2025

The cybercriminal community is rapidly increasing its interest in recruiting personnel from within companies . Instead of sophisticated external attacks, criminals are increasingly relying on internal sources— people willing to provide access to company systems…