Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

HackTheBox 970x120 1
Precedente Successivo

Latest news

Triofox Antivirus Exploited to Install Remote Access Components Cyber News

Triofox Antivirus Exploited to Install Remote Access Components

Google researchers warn that hackers are exploiting a critical vulnerability in Gladinet Triofox to remotely execute code with SYSTEM privileges,...
Redazione RHC - November 13, 2025
Two 0-day attacks, one attack: the perfect strike against Citrix and Cisco. Amazon’s discovery Cyber News

Two 0-day attacks, one attack: the perfect strike against Citrix and Cisco. Amazon’s discovery

Amazon ha segnalato un complesso attacco informatico in cui gli aggressori hanno sfruttato simultaneamente due vulnerabilità zero-day, presenti nei prodotti...
Agostino Pellegrino - November 13, 2025
The Queen of Cryptocurrency Has Been Captured! She Stole $7 Billion in Bitcoin Cyber News

The Queen of Cryptocurrency Has Been Captured! She Stole $7 Billion in Bitcoin

A London court has sentenced 47-year-old Chinese woman Zhimin Qian , also known as Yadi Zhang, to 11 years and...
Bajram Zeqiri - November 13, 2025
Discovering Sandworm: The Kremlin’s National State Group Cyber News

Discovering Sandworm: The Kremlin’s National State Group

As we know, there are different types of cybercriminals. There are ethical hackers and criminal hackers. Within criminal hackers, there...
Redazione RHC - November 12, 2025
Discovering DarkSide: Techniques, Tactics, and Affiliations Cybercrime

Discovering DarkSide: Techniques, Tactics, and Affiliations

Researchers across the cyber community have been exchanging a great deal of information lately about the DarkSide ransomware cyber gang,...
Pietro Melillo - November 12, 2025
Did the US steal 127,000 Bitcoins? China accuses Washington of a massive hack. Cyber News

Did the US steal 127,000 Bitcoins? China accuses Washington of a massive hack.

We're talking about 11 billion euros. A staggering figure! China's National Computer Virus Emergency Response Center (CVERC) said that a...
Bajram Zeqiri - November 12, 2025

TOR Anonymizer v3.0: Advanced Digital Privacy Protection

In a digital landscape increasingly characterized by mass surveillance and indiscriminate data collection, the pursuit of online anonymity has become a primary necessity for journalists, activists, and researchers. It is...

Three serious vulnerabilities discovered in VMware vCenter and NSX: apply patches immediately.

On September 29, 2025, Broadcom released security advisory VMSA-2025-0016 , addressing three vulnerabilities identified in VMware vCenter and VMware NSX products. The bugs affect several solutions in the VMware ecosystem...

0-day 0-click WhatsApp! All it takes is one image to take control of your iPhone.

Some spyware producer is probably doing gymnastics... tearing their hair out. But it's the usual charade: someone finds, someone cashes in, someone integrates, and then the researcher on duty comes...

The US wants to hack Telegram! The case sparks debate over privacy and jurisdiction.

The U.S. Department of Justice has received court authorization to conduct a remote inspection of Telegram's servers as part of an investigation into child exploitation. The prosecutor's motion stated that...

As Windows 10 retires, Windows 7 installs double in two months

Windows 7 was one of Microsoft's best operating systems, and many still praise its stability today . But Microsoft discontinued support for this operating system marvel in January 2020. According...

A DLL hijacking bug targets Notepad++. Risk of arbitrary code execution.

A critical DLL hijacking vulnerability has been identified in Notepad++ version 8.8.3 by security researchers, with the flaw assigned CVE-2025-56383. The vulnerability specifically targets the Notepad++ plugin system, specifically the...

Make training an adventure! Choose Betti RHC for your cybersecurity awareness.

Are you tired of boring e-learning training courses? Do you really want to educate your company's employees about bad and erroneous behaviors so you can keep your company safe? Great!...

Akira Ransomware: New Campaign Targets SonicWall Firewalls

Since late July 2025, a new wave of cyber attacks has been recorded targeting organizations equipped with SonicWall firewalls, with the active spread of the Akira ransomware. According to researchers...

Fujitsu unveils Post-K: the ARM supercomputer that will be 100 times faster than “K”

After having signed the contract to build the Japanese supercomputer "K," one of the most powerful in the world, Fujitsu has announced a new flagship project: Post-K , based on...

Delivery of €13 million in submarine cables for the Shanhaiguan offshore project

At Haihui Port in Xiaoting, along the Yangtze River, a large red steel structure provided the backdrop for the delivery of a massive order of submarine cables from Yichang Qifan....

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE