Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Crowdstriker 970×120
Precedente Successivo

Latest news

Velociraptor used in active attacks to distribute LockBit and Babuk ransomware Cybercrime

Velociraptor used in active attacks to distribute LockBit and Babuk ransomware

Hackers have begun using Velociraptor , the digital forensics and incident response (DFIR) tool, to launch LockBit and Babuk ransomware...
Pietro Melillo - October 11, 2025
RondoDox Botnet Discovered: Thousands of Devices at Risk Cyber News

RondoDox Botnet Discovered: Thousands of Devices at Risk

A large botnet called RondoDox has been discovered exploiting 56 vulnerabilities in more than 30 different devices, including bugs first...
Sandro Sana - October 11, 2025
Microsoft Defender incorrectly flags SQL Server 2019 as End of Life Cyber News

Microsoft Defender incorrectly flags SQL Server 2019 as End of Life

We know that product end-of-life (EoL) brings security risks and the accumulation of vulnerabilities, as manufacturers stop releasing corrective patches....
Redazione RHC - October 10, 2025
The Truth About Windows XP License Key: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8 Cyber News

The Truth About Windows XP License Key: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8

On October 10, new revelations emerged regarding one of the most notorious license keys in computing history: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8 , tied...
Redazione RHC - October 10, 2025
Intel and NVIDIA: From Historic Rivals to Partners in the New Artificial Intelligence Market Cyber News

Intel and NVIDIA: From Historic Rivals to Partners in the New Artificial Intelligence Market

During an interview with Mad Money host Jim Cramer, NVIDIA CEO Jen-Hsun Huang recalled a key moment from his time...
Luca Vinciguerra - October 10, 2025
Salesforce refuses to pay ransom for Scattered Lapsus Hunters attacks Cybercrime

Salesforce refuses to pay ransom for Scattered Lapsus Hunters attacks

Salesforce representatives have announced that they have no intention of negotiating or paying a ransom to the attackers responsible for...
Stefano Gazzella - October 10, 2025

Digital Forensics: The Science That Uncovers the Secrets Hidden in Data

Digital Forensics, or computer forensics, is a discipline that deals with the collection, preservation, analysis, and presentation of digital data for use as evidence in a legal context. This field...

What are Living off the Land (LotL) attacks?

Living off the land means surviving on what you can forage, hunt, or grow, making the most of what nature provides. There could be multiple reasons for doing this: maybe...
cybercognitivismo fabrizio saviano intervista

10 steps to make your company cyber-secure: the RHC guide.

In recent weeks, cyber activity on the internet - due to the Russia-Ukraine conflict - has increased significantly. In recent years, ransomware attacks have pushed Italy to third place among...

New macOS bug allows TCC bypass to steal user data

Microsoft said that attackers may have exploited a recently patched Transparency, Consent, and Control (TCC) bypass vulnerability to steal sensitive information from macOS users, including cached Apple Intelligence data. TCC...

Is Your Smart TV Spying on You? Security Gaps and Critical Vulnerabilities in IoT Devices

Networked smart devices are no longer simple helpers, but potential enemies. With every new thermostat or TV connected to the internet, a new flaw opens up in the digital infrastructure...

7,000 servers wiped out! Silent Crow and Cyberpartisans BY devastate Aeroflot in a historic cyber raid.

While the West battles ransomware attacks and private companies invest in defensive security, on the other side of the digital front, the war is being played out asymmetrically. On July...

Boys recruited for murders and robberies: the FBI’s disturbing alert on the IRL Com group

The FBI has issued a warning about a rapidly growing threat from IRL Com, a subgroup of the underground group The Com that actively recruits teenagers to commit real-world crimes....

Zero-click exploits: the new invisible frontier of cyber attacks

In recent years, cybersecurity has seen the emergence of increasingly sophisticated threats, capable of compromising devices and personal data without the user taking any action. Among these, so-called zero-click exploits...

Vibecoding to create ransomware: FunkSec cybergang uses AI for cyberattacks

Kaspersky Lab specialists studied the activity of the FunkSec group, which emerged in late 2024. The group's main characteristics were: the use of AI-based tools (including in the development of...

What is Ethical Hacking: An Introduction to the Fascinating World of Ethical Hacking

Ethical Hacking is a fascinating yet enigmatic discipline. It's a field where ethics and technology merge to defend the digital world. If you're already intrigued by this mysterious world, or...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE