Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

970x120 Olympous
Precedente Successivo

Latest news

Notepad++ Vulnerability Fixed: Update to 8.8.9 to Avoid Malware Cyber News

Notepad++ Vulnerability Fixed: Update to 8.8.9 to Avoid Malware

Notepad++ is often targeted by attackers because the software is popular and widely used. A recently discovered vulnerability in the...
Redazione RHC - December 11, 2025
Digital Stress: How to Achieve Balance in a Hyper-Connected World Cybercrime

Digital Stress: How to Achieve Balance in a Hyper-Connected World

We live in dissociation: we praise work-life balance, yet we find ourselves constantly online, like puppets on invisible strings. The...
Daniela Farina - December 11, 2025
Uncovering Russia’s Cyber Operations: CISM’s Role in DDoS Attacks Cyber News

Uncovering Russia’s Cyber Operations: CISM’s Role in DDoS Attacks

What we wrote in the article " Patriotic Code: from DDoSia and NoName057(16) to CISM, the algorithm that shapes youth...
Marcello Filacchioni - December 11, 2025
Google Chrome Urgent Update Fixes Zero-Day Vulnerability Cyber News

Google Chrome Urgent Update Fixes Zero-Day Vulnerability

An urgent update has been released by Google for the stable version of the Desktop browser, in order to address...
Silvia Felici - December 11, 2025
Malicious VSCode Extensions Steal Crypto Wallets and Browser Sessions Cyber News

Malicious VSCode Extensions Steal Crypto Wallets and Browser Sessions

Two malicious extensions have been discovered that infect developers' computers with stealer programs on Microsoft's Visual Studio Code marketplace. The...
Sandro Sana - December 10, 2025
The Dark Side of AI: How Technology is Being Used to Control Humans Cybercrime

The Dark Side of AI: How Technology is Being Used to Control Humans

Cory Doctorow says it with the clarity of someone who has studied the consequences of digital capitalism for years: AI,...
Sandro Sana - December 10, 2025

Triofox Antivirus Exploited to Install Remote Access Components

Google researchers warn that hackers are exploiting a critical vulnerability in Gladinet Triofox to remotely execute code with SYSTEM privileges, bypassing authentication and gaining complete control of the system. The...

Two 0-day attacks, one attack: the perfect strike against Citrix and Cisco. Amazon’s discovery

Amazon ha segnalato un complesso attacco informatico in cui gli aggressori hanno sfruttato simultaneamente due vulnerabilità zero-day, presenti nei prodotti Citrix e Cisco. Secondo il responsabile della sicurezza informatica dell'azienda,...

The Queen of Cryptocurrency Has Been Captured! She Stole $7 Billion in Bitcoin

A London court has sentenced 47-year-old Chinese woman Zhimin Qian , also known as Yadi Zhang, to 11 years and eight months in prison for laundering bitcoin obtained through the...

Discovering Sandworm: The Kremlin’s National State Group

As we know, there are different types of cybercriminals. There are ethical hackers and criminal hackers. Within criminal hackers, there are a multitude of dimensions, including, specifically, nation-state-funded hacker groups...

Discovering DarkSide: Techniques, Tactics, and Affiliations

Researchers across the cyber community have been exchanging a great deal of information lately about the DarkSide ransomware cyber gang, the emerging cybercriminal group that has suddenly risen to global...

Did the US steal 127,000 Bitcoins? China accuses Washington of a massive hack.

We're talking about 11 billion euros. A staggering figure! China's National Computer Virus Emergency Response Center (CVERC) said that a state-run entity, likely U.S. , was behind a 2020 attack...

Connecting to public Wi-Fi? Even HTTPS isn’t safe! Let’s find out with this tutorial.

Many people believe that accessing only HTTPS sites is enough to ensure security when browsing on unsecured Wi-Fi networks. Spoiler alert: this belief is also a false sense of security....

Myths and DNS Spoofing: If I Don’t Make Payments or Log In Online, Am I Really Safe?

It's often thought that avoiding online dangers is as simple as not making payments or entering credentials while browsing. This approach, while seemingly prudent, is profoundly flawed for several reasons—especially...

Protecting your WiFi by hiding the name? This is a false sense of security

Security, especially when it comes to WiFi networks, is often the subject of misunderstandings and clichés. In this series of articles in our WiFI column , we aim to debunk...

Open WiFi Networks: A Fertile Ground for Cybercrime

Nowadays, the proliferation of portable, wearable, and other smart devices has made data exchange, access to resources, and web browsing indispensable. This in-depth look at Wi-Fi focuses on a widely...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE