Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Ancharia Mobile 1
TM RedHotCyber 970x120 042543

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

LockBit: The Bluff of Double Extortion Against the Federal Reserve Cybercrime

LockBit: The Bluff of Double Extortion Against the Federal Reserve

In recent years, the cybersecurity landscape has been dominated by the growing threat posed by ransomware groups. Among these, LockBit...
RHC Dark Lab - 26 June 2024
Xehook Stealer: The Rise and Sale of a Formidable Stealer Malware Cybercrime

Xehook Stealer: The Rise and Sale of a Formidable Stealer Malware

Introduction Xehook Stealer is a sophisticated malware targeting Windows operating systems, first discovered in January 2024. Within a year, Xehook...
Pietro Melillo - 26 June 2024
DataLeak Microsoft: 4GB of Microsoft PlayReady Code Made Public! Cybercrime

DataLeak Microsoft: 4GB of Microsoft PlayReady Code Made Public!

On June 11, a Microsoft engineer inadvertently made 4GB of internal code related to Microsoft PlayReady public. The information leak...
Pietro Melillo - 26 June 2024
Linux Kernel UAF 0-day Vulnerability on sale in the Dark Web  Cybercrime

Linux Kernel UAF 0-day Vulnerability on sale in the Dark Web 

Recently, a security alert shaked the infosec environment: A malicious actor has announced the sale of Use After Free (UAF)...
RHC Dark Lab - 25 June 2024
WordPress: Five Plugins Found with Malicious Code Cybercrime

WordPress: Five Plugins Found with Malicious Code

On June 24, 2024, Wordfence revealed a supply chain attack on WordPress plugins, leading to the compromise of five plugins...
Pietro Melillo - 25 June 2024
Julian Assange Free! Freedom Reclaimed After Five Years of Detention Cyberpolitics

Julian Assange Free! Freedom Reclaimed After Five Years of Detention

London, June 25, 2024 - Julian Assange, the founder of WikiLeaks, was released yesterday from the maximum-security Belmarsh prison after...
Pietro Melillo - 25 June 2024

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Cloudflare vs Italy: The Battle for Internet Freedom and DNS Control
Redazione RHC - 14/01/2026

Cloudflare CEO Matthew Prince has threatened to shut down the company’s operations in Italy after the country’s telecom regulator fined it twice its annual revenue in the country. The facts The conflict erupted around Italy’s…

Immagine del sitoCybercrime
Cybercrime Meets Real-Life Violence: Foxtrot Network’s Dark Side
Redazione RHC - 13/01/2026

In recent months, there has been increasing talk of a paradigm shift in cybercrime . What for years was perceived as a predominantly digital ecosystem— consisting of fraud, identity theft, online extortion, and cyberattacks —is…

Immagine del sitoCybercrime
Iran Cyber Crisis: Connettività Compromised
Roberto Villani - 13/01/2026

Sometimes important things don’t arrive at a press conference. They arrive like a graph that stops breathing: the connectivity line collapses, the OSINT dries up, the noise grows as the signal disappears. In Iran, the…

Vulnerability
ServiceNow AI Vulnerability CVE-2025-12420: Critical Security Risk
Redazione RHC - 13/01/2026

A critical flaw has been identified in ServiceNow’s artificial intelligence platform, with a severity score of 9.3 out of 10. This vulnerability, classified as CVE-2025-12420, could allow attackers to impersonate legitimate users without authenticating. ServiceNow…

Immagine del sitoCybercrime
CRISPR-Cas13: Breakthrough in Flu Treatment with Gene Editing
Redazione RHC - 12/01/2026

Influenza remains one of the most stubborn and unpleasant infections on the planet. It returns every winter, mutating, evading the immune system, and eventually becoming drug-resistant. Now, scientists are proposing an unexpected approach that could…