Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Heliaca 970x120 1
Precedente Successivo

Latest news

Myths and DNS Spoofing: If I Don’t Make Payments or Log In Online, Am I Really Safe? Cybercrime

Myths and DNS Spoofing: If I Don’t Make Payments or Log In Online, Am I Really Safe?

It's often thought that avoiding online dangers is as simple as not making payments or entering credentials while browsing. This...
RedWave Team - November 12, 2025
Protecting your WiFi by hiding the name? This is a false sense of security Cybercrime

Protecting your WiFi by hiding the name? This is a false sense of security

Security, especially when it comes to WiFi networks, is often the subject of misunderstandings and clichés. In this series of...
RedWave Team - November 12, 2025
Open WiFi Networks: A Fertile Ground for Cybercrime Cybercrime

Open WiFi Networks: A Fertile Ground for Cybercrime

Nowadays, the proliferation of portable, wearable, and other smart devices has made data exchange, access to resources, and web browsing...
RedWave Team - November 12, 2025
NetScaler ADC and Gateway Vulnerable: Urgent Updates to Prevent XSS Attacks Cyber News

NetScaler ADC and Gateway Vulnerable: Urgent Updates to Prevent XSS Attacks

NetScaler and Citrix - On November 11, 2025, released security bulletin CTX695486 regarding the CVE-2025-12101 vulnerability, which affects the NetScaler...
Redazione RHC - November 12, 2025
LLM: Wikipedia Parasites: The Importance of Humanity in the Age of Artificial Intelligence Cyber News

LLM: Wikipedia Parasites: The Importance of Humanity in the Age of Artificial Intelligence

In the age of rapid advances in artificial intelligence, Wikipedia's importance as a reliable source of knowledge has become particularly...
Luca Vinciguerra - November 12, 2025
The dark web isn’t selling your data. You’re the one putting it up for sale every day! Culture

The dark web isn’t selling your data. You’re the one putting it up for sale every day!

Unfortunately, personal data is a highly attractive and valuable market for cybercriminals, for reasons that are not at all difficult...
Stefano Gazzella - November 12, 2025

New wave of malicious emails associated with the Hive0117 group

F6 has reported a new wave of malicious emails associated with the Hive0117 group. Hive0117 has been active since February 2022 and uses the DarkWatchman RAT Trojan . The group...

Never accept USB flash drives from strangers! A practical example of physical hacking with a USB flash drive.

Have you ever been told that if you find a USB flash drive on the ground, you shouldn't plug it into your computer? Today, we'll explain why you shouldn't do...

An SVG file disguised as a PDF led victims to a fake login

Microsoft Threat Intelligence specialists have identified an attack in which attackers used artificial intelligence for the first time to disguise phishing code. The goal was to steal credentials from companies...

Rhadamanthys Stealer: Introduces an AI feature to extract seed phrases from images

Rhadamanthys is an advanced information stealer that first emerged in 2022. Featuring a rapid development cycle—with at least ten different releases since its inception—the malware is promoted and marketed on...

Active Directory nel mirino! Come i criminal hacker rubano NTDS.dit

Active Directory (AD) contains the organization's digital keys: unauthorized access to this service exposes sensitive information and credentials that can lead to a complete domain compromise. Among the most critical...

Fezbox Malware: The NPM Package That Steals Cookies with QR Codes

Researchers discovered a malicious package called fezbox in npm that steals victims' cookies. To ensure the malicious activity remains undetected, QR codes are used to download the malware from the...

Forget brains and notebooks! ChatGPT dominates classrooms.

ChatGPT usage has skyrocketed with the start of the new school year in the West, with token generation hitting record levels. According to OpenRouter , the popular chatbot OpenAI processed...

Ransomware attack on European airports leaves Berlin in “emergency mode”

Berlin Airport (BER) remains in "emergency mode" for the fifth day after a major cyberattack on its supply chain. Der Spiegel reported the news in yesterday's update. IT services provider...

Two critical bugs in Cisco ASA and FTD: score 9.9 and risk of remote code execution

Cisco has disclosed two critical vulnerabilities affecting its Secure Firewall Adaptive Security Appliance (ASA) and Secure Firewall Threat Defense (FTD) firewalls, as well as other networking products. Both flaws allow...

Code as we knew it is dead! Artificial Intelligence writes the future.

Since 2013, the IEEE has published an annual interactive ranking of the most popular programming languages . However, traditional methods of measuring popularity may be losing their meaning today, due...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE