Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
2nd Edition GlitchZone RHC 320x100 2
Crowdstriker 970×120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Critical MongoDB Vulnerability Exposed: CVE-2025-14847 Cybercrime

Critical MongoDB Vulnerability Exposed: CVE-2025-14847

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security...
Redazione RHC - 23 December 2025
Smart TV Spying: Major Brands Accused of Collecting User Data Cybercrime

Smart TV Spying: Major Brands Accused of Collecting User Data

Texas Attorney General Ken Paxton has charged five major television manufacturers with illegally collecting user data using automatic content recognition...
Redazione RHC - 23 December 2025
Phishing Campaigns Exploit File Sharing Services Cybercrime

Phishing Campaigns Exploit File Sharing Services

Researchers at Check Point, a pioneer and global leader in cybersecurity solutions, have discovered a phishing campaign in which attackers...
Redazione RHC - 23 December 2025
RansomHouse Ransomware Upgraded: Enhanced Encryption Threat Cybercrime

RansomHouse Ransomware Upgraded: Enhanced Encryption Threat

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks....
Redazione RHC - 22 December 2025
Cyber Attacks on the Rise: Wiper Malware and Data Destruction in 2025 Cybercrime

Cyber Attacks on the Rise: Wiper Malware and Data Destruction in 2025

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This...
Redazione RHC - 22 December 2025
MS13-089 Ransomware: Double Extortion Without Encryption Cybercrime

MS13-089 Ransomware: Double Extortion Without Encryption

MS13-089 opens a leak site on the dark web, exposes the first data and adopts a double extortion strategy without...
Inva Malaj - 22 December 2025

Naftali Bennett Telegram Account Hacked in Israel Politics

Former Israeli Prime Minister Naftali Bennett has admitted that his Telegram account was hacked, although his device was not compromised. He made the announcement following reports of a hacked iPhone...
Share on Facebook Share on LinkedIn Share on X

Cisco Secure Email Gateway Vulnerability Exploited: Act Now

A critical zero-day flaw in Cisco Secure Email Gateway and Cisco Secure Email and Web Manager devices is causing concern among security researchers. With over 120 vulnerable devices already identified...
Share on Facebook Share on LinkedIn Share on X

Airbus Eyes Sovereign Cloud to Mitigate US Data Risks

In recent months, a question has been emerging with increasing insistence on European corporate boards: is the US cloud really safe for all companies? Especially for those operating in strategic...
Share on Facebook Share on LinkedIn Share on X

North Korean Hackers Steal $2 Billion in Crypto, Targeting DeFi Sector

In 2025, North Korean hackers stole a record $2 billion in cryptocurrency , 51% more than the previous year. However, the number of attacks has decreased, while the damage has...
Share on Facebook Share on LinkedIn Share on X

Kimwolf Botnet: The Rising Threat of DDoS Attacks on IoT Devices

A new and formidable enemy has emerged in the cyber threat landscape: Kimwolf, a fearsome DDoS botnet, is having a devastating impact on devices worldwide. The consequences of this threat...
Share on Facebook Share on LinkedIn Share on X

54 Arrested in $Multi-Million ATM Jackpotting Scheme Linked to Tren de Aragua

A federal grand jury in the District of Nebraska has indicted a total of 54 people accused of participating in a vast criminal operation that used malware to steal millions...
Share on Facebook Share on LinkedIn Share on X

The Birth of World Wide Web: How Tim Berners-Lee Created the First Website

There you have it! On December 20, 1990, something epochal happened at CERN in Geneva. Tim Berners-Lee , a British computer genius, created the first website in history, info.cern.ch ,...
Share on Facebook Share on LinkedIn Share on X

WatchGuard Firewall Zero-Day Vulnerability CVE-2025-14733 Exploited

A critical zero-day vulnerability, identified as CVE-2025-14733, has left network administrators on their knees, forcing them into a race against time to secure their systems. This flaw, with a CVSS...
Share on Facebook Share on LinkedIn Share on X

Linux Kernel CVE-2025-68260 Vulnerability Fixed: Rust Code at Risk

The world of technology is a veritable battlefield, where coding geniuses challenge malicious attackers every day with exploits and security patches. That's why the recent discovery of a vulnerability in...
Share on Facebook Share on LinkedIn Share on X

Google and Apple Embrace Interoperability with Android iOS Data Transfer

Users looking to switch from an iOS to Android ecosystem or vice versa often face less of a challenge than easily transferring photos, conversation logs, and archives from previous devices....
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
A $500 Tool Claims to Kill EDRs at Kernel Level: Inside the NtKiller Underground Ad
Redazione RHC - 25/12/2025

An ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…

Immagine del sitoCybercrime
Webrat Malware Targets Security Researchers with GitHub Exploit Traps
Redazione RHC - 24/12/2025

There’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…

Immagine del sitoCybercrime
A backdoor in NVIDIA code. Three 9.8 bugs plague AI and robotics development systems
Redazione RHC - 24/12/2025

When it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…

Immagine del sitoCybercrime
La Poste Hit by Pro-Russian DDoS Attack During Peak Holiday Season
Redazione RHC - 23/12/2025

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…

Immagine del sitoVulnerability
CVE-2025-47761: FortiClient VPN Zero-Day Exploit Lets Privilege Escalation
Manuel Roccon - 23/12/2025

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…