Red Hot Cyber. The Cybersecurity Blog
Featured Articles

In today’s environment, securing a network requires much more than setting a complex password. A cyber attack against a wireless network follows a structured path that evolves from passive monitorin...

Post 462 on Durov’s official channel immediately went into “scream mode”: “ The end of the free internet. The free internet is becoming a tool of control .” No birthday wishes. Durov explain...

Security researchers have discovered a sophisticated exploit campaign that leverages a private out-of-band application security testing (OAST) service hosted on Google Cloud infrastructure. The campai...

The underground cybercrime market continues to evolve rapidly, fueled by specialized groups designing and selling tools for increasingly sophisticated digital scams. Among these, a particularly active...

American aviation and defense components manufacturer ADC Aerospace has found itself in the spotlight due to a possible cyber attack by the Play ransomware group, which appeared on their blog where cr...
ShadyPanda Malware Infects 4.3M Browsers with Chrome Edge Extensions
The Dark Side of Internet Control: Durov’s Warning
Phishing Attacks Surge in Black Friday Season: Stay Vigilant
Human Washing Machine Launched: Japan’s Science Unveils Unique Device
Brazilian Systems Targeted in Sophisticated OAST Exploit Campaign
Australian Man Jailed for Evil Twin Wi-Fi Scam Targeting Airline Passengers

ShadyPanda Malware Infects 4.3M Browsers with Chrome Edge Extensions
Redazione RHC - December 1st, 2025
Researchers at Koi Security described a multi-stage operation called ShadyPanda . Over the course of seven years, attackers released seemingly useful extensions for Chrome and Edge, built up an audience...

The Dark Side of Internet Control: Durov’s Warning
Sandro Sana - December 1st, 2025
Post 462 on Durov's official channel immediately went into “scream mode”: “ The end of the free internet. The free internet is becoming a tool of control .” No birthday...

Phishing Attacks Surge in Black Friday Season: Stay Vigilant
Redazione RHC - December 1st, 2025
This year, too, cybercriminals are taking advantage of seasonal shopping periods to spread phishing websites and fraudulent promotions, aiming to steal personal information and payment details . Gaming platforms remain...

Human Washing Machine Launched: Japan’s Science Unveils Unique Device
Redazione RHC - November 30th, 2025
Japanese company Science has launched a washing machine for humans. The 2.30-meter-long capsule bathes a person in 15 minutes and attracted considerable interest at the recently concluded Osaka Expo. The...

Brazilian Systems Targeted in Sophisticated OAST Exploit Campaign
Redazione RHC - November 30th, 2025
Security researchers have discovered a sophisticated exploit campaign that leverages a private out-of-band application security testing (OAST) service hosted on Google Cloud infrastructure. The campaign primarily targets systems in Brazil...

Australian Man Jailed for Evil Twin Wi-Fi Scam Targeting Airline Passengers
Redazione RHC - November 30th, 2025
An Australian court has convicted a 44-year-old man who stole the personal data of airline passengers and airport visitors over several months . He was sentenced to seven years and...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

