Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Enterprise BusinessLog 320x200 1
Crowdstriker 970×120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

A Year of Silence! Plague Discovered, the Linux Malware No One Had Seen Cybercrime

A Year of Silence! Plague Discovered, the Linux Malware No One Had Seen

Researchers at Nextron Systems have discovered a new Linux malware that went undetected for over a year. It allows attackers...
Redazione RHC - 6 August 2025
Microsoft launches a $5 million bug hunt! And the war on zero-days begins! Cybercrime

Microsoft launches a $5 million bug hunt! And the war on zero-days begins!

The global cybersecurity industry is gearing up for a new challenge: Microsoft is launching an updated Zero Day Quest initiative,...
Redazione RHC - 6 August 2025
D-Link cameras under attack! Hackers are still exploiting vulnerabilities from 2020. CISA warns. Cybercrime

D-Link cameras under attack! Hackers are still exploiting vulnerabilities from 2020. CISA warns.

Recently, cybercriminals have refocused on old vulnerabilities in popular D-Link Wi-Fi cameras and DVRs. The U.S. Cybersecurity and Infrastructure Security...
Redazione RHC - 6 August 2025
The Monte Carlo Casino wrote to RHC: “At this stage, no intrusion has been detected.” Cybercrime

The Monte Carlo Casino wrote to RHC: “At this stage, no intrusion has been detected.”

Red Hot Cyber has received and is sharing with its readers the official statement from Monte-Carlo Société des Bains de...
Redazione RHC - 6 August 2025
Digital Decay: When the Promised Future Becomes a Cage Cybercrime

Digital Decay: When the Promised Future Becomes a Cage

For decades, we have celebrated digital as the promise of a more connected, efficient, and democratic future. But today, looking...
Massimiliano Brolli - 6 August 2025
PlayReady Certificate Leak Forces Microsoft to Step In to Protect Streaming Cybercrime

PlayReady Certificate Leak Forces Microsoft to Step In to Protect Streaming

With so many options for streaming video online, content protection continues to be a key concern for copyright holders. This...
Redazione RHC - 6 August 2025

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCulture
Net-NTLMv1 Exploitation: Rainbow Tables for Modern Attacks
Redazione RHC - 18/01/2026

Mandiant has released a large set of rainbow tables dedicated to Net-NTLMv1 with the aim of concretely demonstrating how insecure this authentication protocol has become. Although Net-NTLMv1 has been deprecated for years and its weaknesses…

Immagine del sitoCybercrime
Your paycheck is zero! Congratulations, someone answered the phone wrong
Redazione RHC - 18/01/2026

No worker would accept their paycheck disappearing without explanation. It was precisely from a series of internal reports of this nature that an organization began investigating an apparently administrative anomaly, discovering instead a targeted cyber…

Immagine del sitoCybercrime
Two Ukrainians Suspected in Black Basta Ransomware Attacks
Redazione RHC - 17/01/2026

When it comes to cybersecurity, it’s not uncommon to come across news stories that seem straight out of a science fiction movie. Yet, the reality is even more surprising and sometimes disturbing. The story of…

Immagine del sitoCybercrime
Gootloader Malware Returns with Enhanced Evasion Techniques
Redazione RHC - 17/01/2026

After a long period of silence, the Gootloader downloader malware has returned to the forefront. Last November, the Huntress team detected a new campaign signaling the return of a developer previously associated with the Vanilla…

Immagine del sitoCybercrime
VoidLink Malware: Advanced Linux Framework Targets Cloud Infrastructures
Redazione RHC - 16/01/2026

Check Point researchers have discovered a new Linux infection framework distinguished by its advanced modular architecture and wide range of features. The malware has been dubbed VoidLink . The framework is composed of over 30…