Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Ancharia Mobile 1
HackTheBox 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

TurboDiffusion: AI Video Generation Accelerated Up to 200 Times Cybercrime

TurboDiffusion: AI Video Generation Accelerated Up to 200 Times

Automatic video generation using artificial intelligence took a significant leap on December 25, 2025, when Tsinghua University announced the open...
Redazione RHC - 29 December 2025
OpenAI to Introduce ChatGPT Ads, Revolutionizing AI-Powered Marketing Cybercrime

OpenAI to Introduce ChatGPT Ads, Revolutionizing AI-Powered Marketing

OpenAI is once again discussing the possibility of introducing advertising into ChatGPT , this time in the form of so-called...
Redazione RHC - 29 December 2025
Job Scams on Social Media: How to Avoid Fake Remote Job Offers Cybercrime

Job Scams on Social Media: How to Avoid Fake Remote Job Offers

Fraudulent job ads promising easy money and remote work continue to flood social media, particularly in the Middle East and...
Redazione RHC - 29 December 2025
MongoDB Vulnerability CVE-2025-14847: Critical Memory Disclosure Bug Cybercrime

MongoDB Vulnerability CVE-2025-14847: Critical Memory Disclosure Bug

As previously reported, a serious vulnerability has been discovered in MongoDB that allows a remote attacker, without authentication, to access...
Redazione RHC - 28 December 2025
UK Boosts Subsea Cable Protection with Autonomous Vessels Cybercrime

UK Boosts Subsea Cable Protection with Autonomous Vessels

The UK government has announced plans to strengthen the protection of undersea cables using autonomous vessels. Military ships and aircraft...
Redazione RHC - 28 December 2025
China’s Humanoid Robot Industry Booms with UBtech’s Walker S2 innovation

China’s Humanoid Robot Industry Booms with UBtech’s Walker S2

A video, hundreds of humanoid robots, and a reaction that went viral. When UBtech demonstrated its S2 Walkers moving in...
Redazione RHC - 28 December 2025

Livewire Vulnerability Exposed: 130k Apps at Risk of Remote Code Execution

An in-depth security analysis of Livewire , an essential framework for developing dynamic interfaces in Laravel, has revealed a significant vulnerability. Synacktiv security experts have identified a critical flaw and...
Share on Facebook Share on LinkedIn Share on X

Microsoft Boosts BitLocker with Hardware Acceleration for Enhanced Security

Over the years, Microsoft has strived to keep BitLocker's performance impact within reasonable limits, historically below double digits. The goal has always been to ensure data protection without significantly impacting...
Share on Facebook Share on LinkedIn Share on X

DriverFixer0428: macOS Credential Stealer Linked to North Korea

A thorough static and dynamic analysis has led to the identification of a macOS malware called DriverFixer0428 , classified as a credential stealer and attributed with a medium-high confidence level...
Share on Facebook Share on LinkedIn Share on X

A $500 Tool Claims to Kill EDRs at Kernel Level: Inside the NtKiller Underground Ad

An ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes "NtKiller,"...
Share on Facebook Share on LinkedIn Share on X

Webrat Malware Targets Security Researchers with GitHub Exploit Traps

There's a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written...
Share on Facebook Share on LinkedIn Share on X

Nezha Malware: Abusing Legitimate Tools for Remote Access

There comes a moment, often too late, when you realize the problem didn't come from forcing the door, but from using the house keys. This is what happens when a...
Share on Facebook Share on LinkedIn Share on X

Massive Cloud Cyberespionage: PCPcat Hits 59,128 Servers in 48 Hours

A large-scale, highly automated cyberespionage campaign is systematically targeting the cloud infrastructure that supports numerous modern web applications. In less than 48 hours, tens of thousands of servers have been...
Share on Facebook Share on LinkedIn Share on X

Critical Net-SNMP Vulnerability Exposes Networks to RCE Attacks

A critical vulnerability has been discovered in the Net-SNMP software suite, widely used globally for network management and monitoring. The flaw, classified as CVE-2025-68615, has a CVSS score of 9.8,...
Share on Facebook Share on LinkedIn Share on X

A backdoor in NVIDIA code. Three 9.8 bugs plague AI and robotics development systems

When it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it...
Share on Facebook Share on LinkedIn Share on X

Australia Boosts Papua New Guinea’s Digital Infra with New Undersea Cable

A new undersea cable funded by Australia under a recent mutual defence agreement with Papua New Guinea is set to strengthen the island country's digital infrastructure and ensure continuity of...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Finland Seizes Ship in Cable Damage Probe, Cites Security Threat
Redazione RHC - 31/12/2025

On Wednesday, December 31, Finnish authorities seized a cargo ship believed to be involved in the damage to an undersea telecommunications cable connecting Helsinki to Tallinn, Estonia. The action was triggered after a technical anomaly…

Immagine del sitoCybercrime
Ransomware Attacks on the Rise: US Professionals Turn to Cybercrime
Redazione RHC - 31/12/2025

In the landscape of cybercrime investigations, some cases take on particular significance not only because of the extent of the financial damage, but also because of the profile of the individuals involved . Ransomware investigations,…

Immagine del sitoCybercrime
The Dark Side of Cybercrime: Human Costs and Consequences
Redazione RHC - 31/12/2025

By 2025, cybercrime will increasingly go beyond “just money”: attacks aren’t just about downtime bills and ransom payments , but also about real human consequences, from healthcare disruptions and victim harassment to kidnappings, torture, and…

Immagine del sitoCybercrime
OpenAI Hiring Chief Security Officer to Mitigate AI Risks
Redazione RHC - 30/12/2025

OpenAI, the developer of ChatGPT, has announced the search for a new Chief Security Officer . The position, with an annual salary of $555,000, will be directly responsible for mitigating risks associated with artificial intelligence…

Immagine del sitoCybercrime
Apple Supply Chain Hit by Cyberattack: Sensitive Data at Risk
Redazione RHC - 30/12/2025

During the first half of December, a Chinese company assembling devices for Apple was hit by an advanced cyberattack that may have exposed sensitive information related to a production line. The incident was reported by…