Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Fortinet 970x120px
Precedente Successivo

Latest news

Disloyal Employees: Fired, Returns to Work, and Resets 2,500 Passwords Without the Company’s Knowledge Cyber News

Disloyal Employees: Fired, Returns to Work, and Resets 2,500 Passwords Without the Company’s Knowledge

An employee has pleaded guilty to hacking into his former employer's network and causing nearly $1 million in damages after...
Pietro Melillo - November 21, 2025
MONOLOCK: The new “silent” ransomware group that rejects leak sites and affiliate panels. Cybercrime

MONOLOCK: The new “silent” ransomware group that rejects leak sites and affiliate panels.

The ransomware landscape is changing. The most exposed actors—LockBit, Hunters International, and Trigona—have paid the price for overexposure, including international...
Luca Stivali - November 21, 2025
Critical vulnerability in the WordPress plugin W3 Total Cache. 430,000 sites at risk! Cyber News

Critical vulnerability in the WordPress plugin W3 Total Cache. 430,000 sites at risk!

A critical vulnerability, CVE-2025-9501, has been discovered in the popular WordPress plugin W3 Total Cache . This vulnerability allows the...
Massimiliano Brolli - November 21, 2025
Happy birthday, Windows! 40 years of operating system history and still going strong. Cyber News

Happy birthday, Windows! 40 years of operating system history and still going strong.

Exactly 40 years ago, on November 20, 1985, Microsoft released Windows 1.0 , the first version of Windows, which attempted...
Silvia Felici - November 20, 2025
World Children’s Day: Children live in digital, but digital wasn’t designed for them. Cybercrime

World Children’s Day: Children live in digital, but digital wasn’t designed for them.

Today is World Children's Day, established by the UN on November 20 to commemorate two fundamental acts: the 1959 Declaration...
Simone D'Agostino - November 20, 2025
Meta and Google suspend construction of two undersea cables due to instability in the Red Sea Cyber News

Meta and Google suspend construction of two undersea cables due to instability in the Red Sea

Meta and Google have been forced to postpone several major undersea internet cable projects, including 2Africa and Blue-Raman , in...
Sandro Sana - November 20, 2025

Using a VPN to watch adult content? It’ll be a crime in Wisconsin.

Wisconsin authorities have decided to go further than most other US states in promoting mandatory age verification for accessing adult content. AB 105 / SB 130 , first introduced in...

Pasquale’s Experience: A Text Message in the Heat – Session 1

Cybercrime is increasingly looming over the unfortunate online world. Fake profiles and scams are rampant on social networks, which, even with the best artificial intelligence, struggle to keep up with...

Inside IEEE 802.11 Wireless Networks: Wi-Fi Architecture and Signaling

IEEE 802.11 wireless networks, better known as Wi-Fi, are the beating heart of modern connectivity. From a niche solution for home use to a technological cornerstone for the Internet of...

WiFi: From Marconi’s Origins to the Wireless Network We Know Today

Today, we live in a world where WiFi is a fundamental necessity, but how did this technology, now taken for granted, come about? How did it then develop into the...

Operation SIMCARTEL: 1,200 SIM boxes and 40,000 SIM cards stopped by Europol

On October 10, 2025, Latvian authorities conducted a day of action that resulted in the arrest of five Latvian citizens suspected of running a large-scale cyber fraud network. The operation,...

Problems with localhost on Windows 11 after October updates

The October updates for Windows 11 broke localhost functionality, preventing applications connecting to 127.0.0.1 over HTTP/2 from working properly. While developers typically use localhost to test websites and debug applications,...

“Yuheng,” the microchip that captures the spectra of 10,000 stars per second

A team led by Professor Fang Lu from the Department of Electrical Engineering at Tsinghua University has announced the development of the world's first sub-angstrom resolution spectral imaging chip, dubbed...

Microsoft blocks Vanilla Tempest: Fake Teams installers spread Rhysida ransomware

In early October 2025, Microsoft stopped a large malicious operation attributed to the Vanilla Tempest group, revoking more than 200 digital certificates used to fraudulently sign Microsoft Teams installation files....

Cyberdrones, radar evasion, and autonomous swarms: Rome, the invisible challenge of Jubilee 2025

Jubilee 2025 in Rome presents a challenge not only for managing millions of pilgrims and tourists, but also for protecting urban airspace. Drones, increasingly widespread and accessible, bring with them...

It all started with LinkedIn and a work contact: developers lured, crypto wallets emptied

A North Korean group linked to the DPRK has developed EtherHiding , a method for hiding malicious code within public blockchain smart contracts and modifying payloads on the fly. According...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE