Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
970x20 Itcentric

Category: Vulnerability

ragno spider malware
ragno spider malware

Constant monitoring of security vulnerabilities and bugs, focusing on the latest critical CVEs and risks to systems and digital infrastructure. Guides, patches, updates, and expert advice to prevent attacks and safeguard data. Red Hot Cyber provides in-depth analysis and expert content for IT professionals, organizations, and cybersecurity enthusiasts seeking to stay secure.

Numero di articoli trovati: 64

Vulnerability in 7-Zip: Attackers can perform denial-of-service attacks

A critical security flaw related to memory corruption has been discovered in the popular 7-Zip archiver. This vulnerability can be exploited by attackers to cause denial-of-service conditions by creating malicious...

ToolShell: The New Threat Affecting Microsoft SharePoint Servers

An advanced cyberattack campaign has been detected targeting Microsoft SharePoint servers. This threat exploits a series of vulnerabilities, known as "ToolShell," which allows attackers to gain complete and remote control...

The new version of the Konfety malware uses advanced evasion techniques

A new version of the Android malware called Konfety has become even more sophisticated: specialists at Zimperium zLabs have discovered an improved variant that uses non-standard ZIP archives and loads...

RenderShock: The new digital threat that attacks Windows systems with a mouse click

A new form of digital attack called RenderShock has hit corporate Windows systems. It doesn't require any clicks or opening attachments: everything happens completely in the background, via trusted preview...

Tasting the Exploit: HackerHood testa l’exploit su Wing FTP Server del CVE‑2025‑47812 da Score 10

This tool is intended solely for authorized educational and penetration testing purposes. The author assumes no responsibility for any misuse or damage caused by this software. Always ensure you have...

A RCE vulnerability in Wing FTP Server rated 10 opens the door to 10,000 companies.

Huntress researchers have detected active exploitation of a critical vulnerability in Wing FTP Server, just one day after its public disclosure. The vulnerability CVE-2025-47812 has been assigned the highest severity...

Critical Vulnerabilities Discovered in Hundreds of Brother and Other Printers

Hundreds of printer models from Brother and other manufacturers (Fujifilm, Toshiba, Ricoh and Konica Minolta) have been found to be vulnerable to serious vulnerabilities discovered by researchers at Rapid7. For...

Echelon Stealer: The Open Source Malware

Echelon Stealer is an infostealer malware that was first discovered in 2018 and is still active. Currently shared as an open-source tool on GitHub, Echelon Stealer offers various advanced features...

PoC Released for SQL Injection Without Authentication on WordPress WZone Plugin

A proof of concept (PoC) for a critical vulnerability identified as CVE-2024-33544 has recently been released. This vulnerability involves an unauthenticated SQL injection, which poses a serious threat to the...

Dangerous 0day Windows LPE Vulnerability for Sale in the Underground

A malicious actor, under the name "tikila", has posted an advertisement on a hacking forum for the sale of a local privilege escalation (LPE) vulnerability for Windows. According to the...