Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis

Day: December 28, 2022

Numero di articoli trovati: 223

Claude Down! Major Anthropic AI Outage Hits All Users

Users of Claude, the well-known AI model developed by Anthropic, are currently experiencing significant issues. According to recent reports, the service appears to be undergoing a major outage that is...

Xi Jinping and the Chinese APT’s Ambition

The post-COVID macro political movements, including ongoing conflicts, have prompted a majority of states to shift their medium- to long-term political objectives. Clearly, a paradigm shift has been very common...

State-Sponsored “ILovePoop” Toolkit Targets Global Giants via React2Shell Vulnerability

The shelf life of a critical vulnerability is often measured in days, but React2Shell is proving to have a terrifyingly long tail. Months after its initial discovery, the flaw residing...

Red Card 2.0: A major cybercrime bust! 651 scammers arrested in a major international operation.

A major international operation against online scammers who have been defrauding individuals and businesses for years has concluded in Africa. Over the course of eight weeks, law enforcement arrested hundreds...

Google unveils Gemini 3.1 Pro: a major evolution of artificial intelligence

In recent months, the pace at which artificial intelligence models are evolving has become almost dizzying. Each announcement seems to redefine the next level of technological competition, and even those...

2149 BREAK THE SPHERE! The RHC & Hack The Box CTF at the RHC Conference 2026

In 2149, the world is no longer divided into nations, but into mega Autonomous City-States, hyper-technological urban giants competing for resources, data, and geopolitical power while the entire world is...

RHC Interviews Anubis Ransomware: Their View on RAMP, LockBit and the RaaS “Market”

Author: Luca Stivali, Raffaela Crisci, Lorenzo Nardi During the preliminary exchange leading up to the interview, Anubis expressed a very clear position regarding the collapse of several historical platforms within...

The Most Dangerous Sentence in IT: “Don’t Worry, They’re on Different VLANs”

In the world of IT, there is one expression that lowers defenses more effectively than any zero-day exploit: "Don't worry, they're on different VLANs." It is a reassuring phrase, usually...

Fake 7-Zip Downloads Turn PCs Into Proxies: How to Spot and Stop It

It sounds almost unreal, yet it's happening: a download most people consider safe can quietly turn into a well-designed trap, exposing a system and transforming it into a proxy node....

Payment Networks Shut Down: What Caused the Card Chaos & How to Bounce Back

Some mornings feel like a throwback, right? You wake up scrolling and suddenly read that card machines across parts of the US just… stopped working. Like the '90s all over...