Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
LECS 320x100 1
Cyber Offensive Fundamentals 970x120 V0.1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Critical vulnerability in WordPress Post SMTP plugin: over 200,000 sites at risk Cybercrime

Critical vulnerability in WordPress Post SMTP plugin: over 200,000 sites at risk

Over 200,000 WordPress sites are vulnerable to a critical flaw in the popular Post SMTP plugin, allowing attackers to gain...
Redazione RHC - 28 July 2025
Target: Your Voice! Scattered Spider targets VMware ESXi by cloning employee voices. Cybercrime

Target: Your Voice! Scattered Spider targets VMware ESXi by cloning employee voices.

The Scattered Spider group has intensified its attacks on corporate IT environments, targeting the VMware ESXi hypervisors of US companies...
Redazione RHC - 28 July 2025
Supply Chain Attack: Millions of Projects at Risk Due to JavaScript Library Hack Cybercrime

Supply Chain Attack: Millions of Projects at Risk Due to JavaScript Library Hack

The compromise of a widely used JavaScript library has put millions of projects worldwide at risk. The package in question...
Redazione RHC - 28 July 2025
BreachForums is back online! 7.3 million posts and 340,000 users restored. Cybercrime

BreachForums is back online! 7.3 million posts and 340,000 users restored.

If weeds aren't pulled out by the roots, they'll grow back, much more vigorous than before. This is cybercrime, and...
Redazione RHC - 28 July 2025
Microsoft Betrayed from Within? Chinese Hackers Exploited SharePoint Bugs Before Patches Cybercrime

Microsoft Betrayed from Within? Chinese Hackers Exploited SharePoint Bugs Before Patches

Microsoft has launched an internal investigation to determine whether a leak of confidential information from the Microsoft Active Protections Program...
Redazione RHC - 28 July 2025
Vibecoding to create ransomware: FunkSec cybergang uses AI for cyberattacks Cybercrime

Vibecoding to create ransomware: FunkSec cybergang uses AI for cyberattacks

Kaspersky Lab specialists studied the activity of the FunkSec group, which emerged in late 2024. The group's main characteristics were:...
Redazione RHC - 28 July 2025

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Two Ukrainians Suspected in Black Basta Ransomware Attacks
Redazione RHC - 17/01/2026

When it comes to cybersecurity, it’s not uncommon to come across news stories that seem straight out of a science fiction movie. Yet, the reality is even more surprising and sometimes disturbing. The story of…

Immagine del sitoCybercrime
Gootloader Malware Returns with Enhanced Evasion Techniques
Redazione RHC - 17/01/2026

After a long period of silence, the Gootloader downloader malware has returned to the forefront. Last November, the Huntress team detected a new campaign signaling the return of a developer previously associated with the Vanilla…

Immagine del sitoCybercrime
VoidLink Malware: Advanced Linux Framework Targets Cloud Infrastructures
Redazione RHC - 16/01/2026

Check Point researchers have discovered a new Linux infection framework distinguished by its advanced modular architecture and wide range of features. The malware has been dubbed VoidLink . The framework is composed of over 30…

Immagine del sitoCybercrime
Microsoft Copilot Vulnerability Exposes User Data to Hackers
Redazione RHC - 15/01/2026

A recently fixed vulnerability allowed attackers to exploit Microsoft Copilot Personal with a single click to steal sensitive user data. Using a phishing link, attackers were able to take control of sessions without requiring further…

Immagine del sitoCybercrime
Progress Software Patches LoadMaster, MOVEit WAF Vulnerabilities
Redazione RHC - 15/01/2026

On January 12, 2026, Progress Software Corporation released patches that address two high-severity Command Injection vulnerabilities, which could allow remote attackers to execute malicious code on LoadMaster load balancers and MOVEit Web Application Firewalls (WAFs).…