Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Banner Ransomfeed 970x120 1
Precedente Successivo

Latest news

Cyber Incident Management in the NIS2 Era Cybercrime

Cyber Incident Management in the NIS2 Era

The NIS 2 Decree (Legislative Decree 138/2024), effective October 16, 2024, implements the principles of the European NIS2 Directive, laying...
Giancarlo Di Lieto - October 30, 2025
Tasting the Exploit: HackerHood tests Microsoft WSUS CVE-2025-59287 Exploit Cybercrime

Tasting the Exploit: HackerHood tests Microsoft WSUS CVE-2025-59287 Exploit

The cybersecurity landscape was recently rocked by the discovery of a critical Remote Code Execution (RCE) vulnerability in Microsoft’s Windows...
Manuel Roccon - October 29, 2025
183 million Gmail accounts hacked! But it was just a hoax Cyber News

183 million Gmail accounts hacked! But it was just a hoax

For the second time in recent months, Google has been forced to deny reports of a massive Gmail data breach...
Sandro Sana - October 29, 2025
Microsoft acquires 27% of OpenAI for $135 billion Cyber News

Microsoft acquires 27% of OpenAI for $135 billion

After nearly a year of negotiations with its longtime backer Microsoft, OpenAI has granted the latter a 27% stake ....
Redazione RHC - October 29, 2025
Malware alert: Critical WordPress plugin vulnerabilities actively exploited Vulnerability

Malware alert: Critical WordPress plugin vulnerabilities actively exploited

Wordfence is raising the alarm about a large-scale malware campaign in which attackers are exploiting critical vulnerabilities in the popular...
Agostino Pellegrino - October 29, 2025
ClayRat: The spyware that targets Android users with self-propagation Cyber News

ClayRat: The spyware that targets Android users with self-propagation

The ClayRat spyware campaign is expanding rapidly and increasingly targeting Android users. According to Zimperium, the malware is actively spreading...
Bajram Zeqiri - October 29, 2025

38 million Italian phone numbers for sale on the dark web. It’s smishing!

Seven out of ten Italians have their phone numbers included in this database. But what does it mean to have such a large number of phone numbers concentrated within a...

Apitor, the first robot that helps children do their homework and the whistleblower for China

The U.S. Department of Justice has filed a lawsuit against Apitor Technology, accusing it of secretly collecting children's location data through a Chinese partner without their parents' knowledge or consent....

Hackable restaurant robots could serve sushi… at the attacker’s home.

An independent security specialist, known by the nickname BobDaHacker, discovered security flaws in Pudu Robotics (the world's leading provider of commercial service robots). The vulnerabilities allowed attackers to redirect the...

LECS powered by Cyber Evolution: la prima black box NDR completamente Made in Italy

In the current cybersecurity landscape, threats are moving ever faster and more sophisticated. Traditional defense tools are no longer sufficient to ensure complete visibility, especially when the attack leaves no...

Figure 02, the robot that loads the dishwasher with precision

California-based company Figure has unveiled another milestone for its humanoid Figure 02: the robot loaded a dishwasher with high precision using the versatile Helix model, based on the Vision-Language-Action (VLA)...

If Flash is dead, here’s the SVG Assassin! Phishing 2.0 is in high definition.

Cybercriminals have launched a new wave of attacks using SVG files to distribute phishing pages. Experts at VirusTotal have reported that attackers are impersonating the Colombian prosecutor's office, distributing email...

The Dark Side of Windows Drivers: How to Steal Data While Ignoring EDR

A recent study conducted by Workday's Offensive Security team highlighted a vulnerability in Windows drivers that effectively bypasses Endpoint Detection and Response (EDR) tools. This technique exploits direct disk reading,...

GhostRedirector: The Black SEO Redirect Campaign That Manipulates Search Engines

A cybercriminal group, dubbed GhostRedirector by ESET researchers and linked to the Chinese ecosystem, has quietly deployed a global search engine manipulation scheme based on hacked Windows hosts. According to...

Attackers are using Velociraptor for cyberattacks. Rapid7 is aware

Sophos security specialists have drawn attention to a cyberattack in which unknown attackers used the open-source forensic tool Velociraptor to monitor endpoints. "In this incident, attackers used a tool to...

Underwater warfare is upon us! Will Chinese cable cutters pose a global threat?

The new cable cutter, developed by the China Shipbuilding Research Center, is designed for use on advanced submarines such as the Fengdou and Haidou series. The device is capable of...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE