Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Crowdstriker 970×120
Precedente Successivo

Latest news

Let’s discover injections explained in a simple way Cybercrime

Let’s discover injections explained in a simple way

Good morning everyone. I'm Davide Cavallini, a web developer and penetration tester. Today I'm going to talk about injections. There...
Davide Cavallini - November 15, 2025
A journey into the world of OT/ICS: What are SCADA servers? Cyber News

A journey into the world of OT/ICS: What are SCADA servers?

The world of OT (Operational Technology) and ICS (Industrial Control Systems) is closely related to SCADA (Supervisory Control and Data...
Redazione RHC - November 15, 2025
Quishing: What it is, how it works, and how to protect yourself Cyber News

Quishing: What it is, how it works, and how to protect yourself

Quishing is an emerging form of cyberattack that combines traditional phishing with the use of QR codes , tools now...
Redazione RHC - November 15, 2025
Password Managers: A Complete Guide to Choosing and Using Them Cyber News

Password Managers: A Complete Guide to Choosing and Using Them

Passwords: how important are they in our digital lives? How many times have we reported this on our pages? Most...
Pietro Melillo - November 15, 2025
Discovering the NIS2 Directive: Security and Resilience of Digital Systems in the European Union Cybercrime

Discovering the NIS2 Directive: Security and Resilience of Digital Systems in the European Union

On 10 November 2022, the European Parliament, by a large majority, approved the NIS2 (Network and Information System Security) Directive...
Riccardo Nuti - November 15, 2025
Kraken Arrives: The New Ransomware That Assesses Your Environment to Inflict Maximum Damage Cyber News

Kraken Arrives: The New Ransomware That Assesses Your Environment to Inflict Maximum Damage

Cisco Talos researchers have detected an active wave of attacks using a new ransomware called Kraken. The group began operating...
Redazione RHC - November 15, 2025

Why does the United States buy rare earths from China despite its own reserves?

In recent years, the topic of rare earths has returned to the forefront of international debate, especially given China's dominant role in this strategic sector. Many wonder: why does the...

An 8-year-old critical bug in the Unity game engine poses risks to Android and Windows.

A vulnerability has been discovered in the Unity game engine, which has been present since 2017. The issue can be exploited for code execution on Android and privilege escalation on...

11 death sentences for online fraud. China deals a severe blow to cybercrime

Amid China's long battle against cross-border fraud, authorities have issued a verdict in one of the most high-profile cases in recent years. It concerns a large-scale criminal network operating in...

Securing WebSocket Connections: Risk, Analysis, and Practical Measures

WebSockets offer persistent two-way communication between client and server, essential for real-time applications like chat, gaming, dashboards, and notifications. However, this persistence introduces specific attack surfaces: if the channel or...

WhatsApp Alert: New Malware Spreads Like a Virus Among Contacts

Trend Micro researchers have detected a large-scale malware campaign targeting users in Brazil. It is distributed via the desktop version of WhatsApp and is characterized by a high infection rate....

ChatGPT becomes a social media platform: private messaging is coming soon.

OpenAI appears to be preparing ChatGPT to become a social platform, not just a traditional AI-powered chat app. The company already has Sora 2, which offers a feed of generated...

25,000 kilometers, the new Seacom2.0 submarine cable to connect Europe, Africa and Asia

Seacom, an African submarine infrastructure operator, has announced the launch of Seacom 2.0 , an international cable system designed to connect Europe, the Middle East, Africa and Asia. The project...

Oracle E-Business Suite 9.8 Vulnerability: Urgent Updates Needed

Oracle has published a security advisory regarding a critical vulnerability identified as CVE-2025-61882 in the Oracle E-Business Suite . The flaw can be exploited remotely without authentication , potentially allowing...

Apple in the crosshairs? Alleged 9GB data breach claim on Darkforums

Author : Inva Malaj and Raffaela Crisci 04/10/2025 – Darkforums.st: “303” Claims 9GB Data Breach on Apple.com In the early hours of October 4, 2025, a data breach claim emerged...

When AI writes poetry: is the future of human creativity over?

In 1950, Alan Turing, considered the father of artificial intelligence, was still wondering "Can machines think?" Today, more than seventy years later, public perception seems to have changed radically: more...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE