Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
HackTheBox 970x120 1

Author: Redazione RHC

Redazione RHC

The Red Hot Cyber Editorial Team provides daily updates on bugs, data breaches, and global threats. Every piece of content is validated by our community of experts, including Pietro Melillo, Massimiliano Brolli, Sandro Sana, Olivia Terragni, and Stefano Gazzella.

Through synergy with our industry-leading partners—such as Accenture, CrowdStrike, Trend Micro, and Fortinet—we transform technical complexity into collective awareness. We ensure information accuracy by analyzing primary sources and maintaining a rigorous technical peer-review process.

Numero di articoli trovati: 375

PoisonSeed: How Phishing Attacks Bypass FIDO with WebAuthn

The authors of the PoisonSeedphishing campaign have found a way to bypass FIDO (in this case, FIDO2 with WebAuthn) using the cross-device authentication mechanism implemented in WebAuthn. The attackers convince...

Proxy Trickster: The Amateur Hackers Group That Wants to Own Servers Worldwide

Specialists at Solar 4RAYS of Solar Group have discovered a new hacker group, Proxy Trickster, dedicated to cryptocurrency mining and proxyjacking (interception of server control for conversion and sale). Over...

Companies Go Bankrupt Due to Ransomware! Einhaus Group Shuts Down, Serving as a Warning to Everyone

We discussed this in an article on the topic some time ago written by Massimiliano Brolli. Today, cybersecurity is no longer an option or an ancillary value: it is a...

Discovering Wipers: The Silent Threat That Ruthlessly Destroys Data

Wider malware (in Italian "eliminator" or "deleter") is a type of malicious software designed to destroy or "erase" data and files on the computer systems it infects. Unlike other types...

New GhostContainer backdoor discovered that threatens Asian companies’ Exchange instances

Kaspersky Lab specialists have discovered a new backdoor called GhostContainer, based on open-source tools. Researchers believe the appearance of this malware may be part of a sophisticated targeted campaign targeting...

Backdoor Alert! China Concerned About Possible Interference Through Nvidia Chips

The Cyberspace Administration of China (CAC) has expressed concern about the recent US proposal to integrate tracking and localization capabilities into advanced chips intended for export. This measure could jeopardize...

Microsoft Edge launches Copilot mode, following Chrome’s lead.

After two years of small changes to the Edge browser's AI features, Microsoft recently added Copilot mode to the Edge browser, officially entering the AI browser market. Specifically, the AI...

Vibe Coding Goes Wild. AI Generates Vulnerable Code, But No One Cares

Artificial intelligence is increasingly becoming a programmers' assistant, but a Veracode study has shown that convenience comes with a security risk. An analysis of 100 top language models (LLMs) revealed...

Russia introduces fines for accessing extremist material via VPN

Russian President Vladimir Putin signed a law establishing administrative liability for VPN service owners and introducing fines for those who deliberately search for and gain access to extremist material. Last...

Nokia under attack: database of nearly 100,000 employees appears for sale on DarkForums.

A user with the nickname Tsar0Byte posted a shocking announcement on DarkForums, one of the most well-known underground forums in the cybercrime world: the alleged compromise of sensitive data belonging...