Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Mobile
TM RedHotCyber 970x120 042543

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

James Cameron: AI can cause devastation like Skynet and Terminator Cybercrime

James Cameron: AI can cause devastation like Skynet and Terminator

"The Skynet military defense system will go live on August 4, 1997. It will begin to self-educate, learning at an...
Redazione RHC - 10 August 2025
150 Malicious Firefox Extensions Stole $1 Million in Cryptocurrency Cybercrime

150 Malicious Firefox Extensions Stole $1 Million in Cryptocurrency

Koi Security analysts have discovered the GreedyBear malware campaign active in the Mozilla add-on store. 150 malicious Firefox extensions stole...
Redazione RHC - 10 August 2025
Over 60s, Under Fire! Hackers Stole $700 Million from Seniors Cybercrime

Over 60s, Under Fire! Hackers Stole $700 Million from Seniors

Americans over 60 lost a staggering $700 million to online fraud in 2024, the highest figure ever recorded by the...
Redazione RHC - 10 August 2025
EDRs are still going offline! Threats are growing with EDRKillShifter’s offspring. Cybercrime

EDRs are still going offline! Threats are growing with EDRKillShifter’s offspring.

A new tool for disabling EDR systems has emerged in the cybercriminal community, which Sophos experts believe to be an...
Redazione RHC - 10 August 2025
GPT-5 Hacked in 24 Hours. Experts Find Surprising Weaknesses Cybercrime

GPT-5 Hacked in 24 Hours. Experts Find Surprising Weaknesses

After Grok-4 was cracked in two days, GPT-5 was defeated in just 24 hours by the same researchers. Almost simultaneously,...
Redazione RHC - 9 August 2025
Did you double-click WinRAR? Congratulations! You’ve been compromised Cybercrime

Did you double-click WinRAR? Congratulations! You’ve been compromised

A recently closed WinRAR vulnerability tracked under CVE-2025-8088 was exploited in targeted phishing attacks before the patch was released. The...
Redazione RHC - 9 August 2025

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCulture
Net-NTLMv1 Exploitation: Rainbow Tables for Modern Attacks
Redazione RHC - 18/01/2026

Mandiant has released a large set of rainbow tables dedicated to Net-NTLMv1 with the aim of concretely demonstrating how insecure this authentication protocol has become. Although Net-NTLMv1 has been deprecated for years and its weaknesses…

Immagine del sitoCybercrime
Your paycheck is zero! Congratulations, someone answered the phone wrong
Redazione RHC - 18/01/2026

No worker would accept their paycheck disappearing without explanation. It was precisely from a series of internal reports of this nature that an organization began investigating an apparently administrative anomaly, discovering instead a targeted cyber…

Immagine del sitoCybercrime
Two Ukrainians Suspected in Black Basta Ransomware Attacks
Redazione RHC - 17/01/2026

When it comes to cybersecurity, it’s not uncommon to come across news stories that seem straight out of a science fiction movie. Yet, the reality is even more surprising and sometimes disturbing. The story of…

Immagine del sitoCybercrime
Gootloader Malware Returns with Enhanced Evasion Techniques
Redazione RHC - 17/01/2026

After a long period of silence, the Gootloader downloader malware has returned to the forefront. Last November, the Huntress team detected a new campaign signaling the return of a developer previously associated with the Vanilla…

Immagine del sitoCybercrime
VoidLink Malware: Advanced Linux Framework Targets Cloud Infrastructures
Redazione RHC - 16/01/2026

Check Point researchers have discovered a new Linux infection framework distinguished by its advanced modular architecture and wide range of features. The malware has been dubbed VoidLink . The framework is composed of over 30…