Welcome to Red Hot Cyber | Cybersecurity News
Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
320×100
970x20 Itcentric

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

WiFi Network Security: Protect Against Hacking with WPA3 and ARP Spoofing
Di Francesco Demarcus - 02/12/2025

In today’s environment, securing a network requires much more than setting a complex password. A cyber attack against a wireless network follows a structured path that evolves from passive monitorin...

Immagine del sito
The Dark Side of Internet Control: Durov’s Warning
Di Sandro Sana - 02/12/2025

Post 462 on Durov’s official channel immediately went into “scream mode”: “ The end of the free internet. The free internet is becoming a tool of control .” No birthday wishes. Durov explain...

Immagine del sito
Brazilian Systems Targeted in Sophisticated OAST Exploit Campaign
Di Redazione RHC - 01/12/2025

Security researchers have discovered a sophisticated exploit campaign that leverages a private out-of-band application security testing (OAST) service hosted on Google Cloud infrastructure. The campai...

Immagine del sito
KrakenBite Phishing Service Exposed
Di Redazione RHC - 01/12/2025

The underground cybercrime market continues to evolve rapidly, fueled by specialized groups designing and selling tools for increasingly sophisticated digital scams. Among these, a particularly active...

Immagine del sito
ADC Aerospace Hit by Play Ransomware Attack, Data Breach Feared
Di Redazione RHC - 01/12/2025

American aviation and defense components manufacturer ADC Aerospace has found itself in the spotlight due to a possible cyber attack by the Play ransomware group, which appeared on their blog where cr...

Cryptomixer Shut Down: Europol Cracks Down on $1.3B Bitcoin Mixing Service

Law enforcement agencies in Switzerland and Germany have reported the dismantling of Cryptomixer , a major mixing service operating since 2016 that he...
Redazione RHC - 02/12/2025 - 13:12

888 Data Leaker: Ryanair Breach Exposed

In the underground forum landscape, there are actors who operate episodically, seeking a single media hit, and others who build an almost industrial p...
Luca Stivali - 02/12/2025 - 13:00

WiFi Network Security: Protect Against Hacking with WPA3 and ARP Spoofing

In today's environment, securing a network requires much more than setting a complex password. A cyber attack against a wireless network follows a str...
Francesco Demarcus - 02/12/2025 - 10:26

ShadyPanda Malware Infects 4.3M Browsers with Chrome Edge Extensions

Researchers at Koi Security described a multi-stage operation called ShadyPanda . Over the course of seven years, attackers released seemingly useful ...
Redazione RHC - 02/12/2025 - 08:09

The Dark Side of Internet Control: Durov’s Warning

Post 462 on Durov's official channel immediately went into “scream mode”: “ The end of the free internet. The free internet is becoming a tool of cont...
Sandro Sana - 02/12/2025 - 07:25

Phishing Attacks Surge in Black Friday Season: Stay Vigilant

This year, too, cybercriminals are taking advantage of seasonal shopping periods to spread phishing websites and fraudulent promotions, aiming to stea...
Redazione RHC - 02/12/2025 - 07:10
1 2 3 262

Cryptomixer Shut Down: Europol Cracks Down on $1.3B Bitcoin Mixing Service

- December 1st, 2025

Law enforcement agencies in Switzerland and Germany have reported the dismantling of Cryptomixer , a major mixing service operating since 2016 that helped criminals launder illicitly obtained funds. According to...

Facebook Linkedin X

888 Data Leaker: Ryanair Breach Exposed

- December 1st, 2025

In the underground forum landscape, there are actors who operate episodically, seeking a single media hit, and others who build an almost industrial pipeline of compromises over time, releasing technical...

Facebook Linkedin X

WiFi Network Security: Protect Against Hacking with WPA3 and ARP Spoofing

- December 1st, 2025

In today's environment, securing a network requires much more than setting a complex password. A cyber attack against a wireless network follows a structured path that evolves from passive monitoring...

Facebook Linkedin X

ShadyPanda Malware Infects 4.3M Browsers with Chrome Edge Extensions

- December 1st, 2025

Researchers at Koi Security described a multi-stage operation called ShadyPanda . Over the course of seven years, attackers released seemingly useful extensions for Chrome and Edge, built up an audience...

Facebook Linkedin X

The Dark Side of Internet Control: Durov’s Warning

- December 1st, 2025

Post 462 on Durov's official channel immediately went into “scream mode”: “ The end of the free internet. The free internet is becoming a tool of control .” No birthday...

Facebook Linkedin X

Phishing Attacks Surge in Black Friday Season: Stay Vigilant

- December 1st, 2025

This year, too, cybercriminals are taking advantage of seasonal shopping periods to spread phishing websites and fraudulent promotions, aiming to steal personal information and payment details . Gaming platforms remain...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE