Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
UtiliaCS 320x100
Redhotcyber Banner Sito 970x120px Uscita 101125

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Webrat Malware Targets Security Researchers with GitHub Exploit Traps Cybercrime

Webrat Malware Targets Security Researchers with GitHub Exploit Traps

There's a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a...
Redazione RHC - 24 December 2025
Nezha Malware: Abusing Legitimate Tools for Remote Access Cybercrime

Nezha Malware: Abusing Legitimate Tools for Remote Access

There comes a moment, often too late, when you realize the problem didn't come from forcing the door, but from...
Redazione RHC - 24 December 2025
Massive Cloud Cyberespionage: PCPcat Hits 59,128 Servers in 48 Hours Cybercrime

Massive Cloud Cyberespionage: PCPcat Hits 59,128 Servers in 48 Hours

A large-scale, highly automated cyberespionage campaign is systematically targeting the cloud infrastructure that supports numerous modern web applications. In less...
Redazione RHC - 24 December 2025
Critical Net-SNMP Vulnerability Exposes Networks to RCE Attacks Cybercrime

Critical Net-SNMP Vulnerability Exposes Networks to RCE Attacks

A critical vulnerability has been discovered in the Net-SNMP software suite, widely used globally for network management and monitoring. The...
Redazione RHC - 24 December 2025
A backdoor in NVIDIA code. Three 9.8 bugs plague AI and robotics development systems Cybercrime

A backdoor in NVIDIA code. Three 9.8 bugs plague AI and robotics development systems

When it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones),...
Redazione RHC - 24 December 2025
Australia Boosts Papua New Guinea’s Digital Infra with New Undersea Cable Cybercrime

Australia Boosts Papua New Guinea’s Digital Infra with New Undersea Cable

A new undersea cable funded by Australia under a recent mutual defence agreement with Papua New Guinea is set to...
Redazione RHC - 23 December 2025

A backdoor in NVIDIA code. Three 9.8 bugs plague AI and robotics development systems

When it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it...
Share on Facebook Share on LinkedIn Share on X

Australia Boosts Papua New Guinea’s Digital Infra with New Undersea Cable

A new undersea cable funded by Australia under a recent mutual defence agreement with Papua New Guinea is set to strengthen the island country's digital infrastructure and ensure continuity of...
Share on Facebook Share on LinkedIn Share on X

China Issues First Level 3 Autonomous Driving Licenses, Paving Way for Self-Driving Cars

On December 23, the Traffic Management Bureau of the Beijing Municipal Public Security Bureau officially issued the first batch of Level 3 autonomous driving license plates to three intelligent vehicles....
Share on Facebook Share on LinkedIn Share on X

Nvidia H200 Chip Shipments to China Set to Begin

Nvidia has informed its customers in China of its intention to begin shipping the first H200 chip, the company's second-most powerful AI accelerator, before New Year's Eve. The information was...
Share on Facebook Share on LinkedIn Share on X

La Poste Hit by Pro-Russian DDoS Attack During Peak Holiday Season

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective...
Share on Facebook Share on LinkedIn Share on X

Spotify Web Scraping: Anna’s Archive Scrapes 300TB of Music Library

Activists and hackers at Anna's Archive have reportedly combed nearly the entire music library of the largest streaming service, Spotify. They claim to have collected metadata for 256 million tracks...
Share on Facebook Share on LinkedIn Share on X

CVE-2025-47761: FortiClient VPN Zero-Day Exploit Lets Privilege Escalation

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies...
Share on Facebook Share on LinkedIn Share on X

Ukrainian Hacker Charged in Major Ransomware Attacks

A Ukrainian man implicated in a series of ransomware attacks has been found guilty in the United States. These cybercrimes affected companies in several countries, including the United States, Canada,...
Share on Facebook Share on LinkedIn Share on X

The Rise of Digital Walls: How National Sovereignty Threatens Global Internet

As we always report on these pages, nations are pushing for the development of domestic software and hardware devices, that is, technologies developed within the nation that are more easily...
Share on Facebook Share on LinkedIn Share on X

Critical MongoDB Vulnerability Exposed: CVE-2025-14847

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Villager Framework: AI-Powered Penetration Testing Tool
Redazione RHC - 26/12/2025

Straiker’s AI Research (STAR) team has identified Villager, a native AI-based penetration testing framework developed by the Chinese group Cyberspike . The tool, presented as a red team solution , is designed to fully automate…

Immagine del sitoCybercrime
A $500 Tool Claims to Kill EDRs at Kernel Level: Inside the NtKiller Underground Ad
Redazione RHC - 25/12/2025

An ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…

Immagine del sitoCybercrime
Webrat Malware Targets Security Researchers with GitHub Exploit Traps
Redazione RHC - 24/12/2025

There’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…

Immagine del sitoCybercrime
A backdoor in NVIDIA code. Three 9.8 bugs plague AI and robotics development systems
Redazione RHC - 24/12/2025

When it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…

Immagine del sitoCybercrime
La Poste Hit by Pro-Russian DDoS Attack During Peak Holiday Season
Redazione RHC - 23/12/2025

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…