Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Latest news

Apple and Google under pressure: German regulator wants to remove DeepSeek Cyber News

Apple and Google under pressure: German regulator wants to remove DeepSeek

Following the Italian data protection regulator, Germany's data protection watchdog has now asked Apple and Alphabet subsidiary Google to remove...
Redazione RHC - June 28, 2025
A former Australian university student has been accused of hacking Western Sydney University Cyber News

A former Australian university student has been accused of hacking Western Sydney University

New South Wales police have arrested a 27-year-old former Western Sydney University student who had repeatedly hacked into the university's...
Redazione RHC - June 28, 2025
Skynet is coming: the malware that attacks Artificial Intelligence! Cyber News

Skynet is coming: the malware that attacks Artificial Intelligence!

An unusual example of malicious code has been discovered in a real computing environment, which for the first time recorded...
Sandro Sana - June 27, 2025
Critical Vulnerabilities Discovered in Hundreds of Brother and Other Printers Vulnerability

Critical Vulnerabilities Discovered in Hundreds of Brother and Other Printers

Hundreds of printer models from Brother and other manufacturers (Fujifilm, Toshiba, Ricoh and Konica Minolta) have been found to be...
Agostino Pellegrino - June 27, 2025
He died because of ransomware! Another victim joins the list Cyber News

He died because of ransomware! Another victim joins the list

This is not the first time that a cyber attack has resulted in the loss of human lives.We had already...
Redazione RHC - June 26, 2025
A new fileless infostealer is being spread by Telegram and legitimate services Cyber News

A new fileless infostealer is being spread by Telegram and legitimate services

TLP: AMBERAnalyst: Agostino Pellegrino, Crescenzo Cuoppolo, Alessio BandiniLast revision date: 2025-06-24 This forensic technical report documents the complete analysis of...
Sandro Sana - June 26, 2025
Citrix: New Critical Vulnerability from 9.2 Affects NetScaler – Attacks Underway! Cyber News

Citrix: New Critical Vulnerability from 9.2 Affects NetScaler – Attacks Underway!

Citrix has reported a new critical vulnerability in its NetScaler appliances, already actively exploited by attackers. The problem is identified...
Massimiliano Brolli - June 26, 2025
REvil: Sentenced but then set free. The most controversial court case ever Cyber News

REvil: Sentenced but then set free. The most controversial court case ever

Do you remember the infamous REvil cyber gang? The Russian hacker group responsible for some of the most devastating ransomware...
Pietro Melillo - June 26, 2025
Shock in France: the gentlemen of BreachForums were twenty-year-old French citizens! Cyber News

Shock in France: the gentlemen of BreachForums were twenty-year-old French citizens!

Shocking news in France: one of the largest global cybercrime networks dismantled. The BreachForum hackers were… French. French authorities have...
Redazione RHC - June 25, 2025
Zero-Click Attack on Notepad++. HackerHood Tested the Exploit and It Really Works with Little Cyber News

Zero-Click Attack on Notepad++. HackerHood Tested the Exploit and It Really Works with Little

A dangerous vulnerability has been discovered in the latest version of the popular text editor Notepad++ that allows an attacker...
Manuel Roccon - June 25, 2025
22,000 Sites At Risk: New Motors WordPress Vulnerability Allows Total Hacking Cyber News

22,000 Sites At Risk: New Motors WordPress Vulnerability Allows Total Hacking

Attackers are actively exploiting a critical privilege escalation vulnerability in the WordPress Motors theme, allowing them to hijack administrator accounts and take...
Massimiliano Brolli - June 25, 2025
Qilin & Associates Law Firm: Ransomware Hires Lawyers, Launches “Intimidation Package” Cybercrime

Qilin & Associates Law Firm: Ransomware Hires Lawyers, Launches “Intimidation Package”

The developers of the Qilin ransomware (recently interviewed by us) offered their partners the help and advice of a team...
Pietro Melillo - June 25, 2025

HoneyPLC: the new honeypot that revolutionizes the defense of industrial plants

Industrial Control Systems (ICS), critical to the operation of critical infrastructure such as power, water and transportation networks, are increasingly vulnerable to cyberattacks. In this context, the article HoneyPLC: A...

Discovering Predatory Sparrow: Identity, Goals, and Digital Arsenal of the Mysterious Threat Actor

On June 17, 2025, a cyber attack paralyzed Bank Sepah, one of Iran's major financial institutions. The attack was claimed by the Predatory Sparrow group, already known for its destructive...

Famous hackers: the sad story of Jonathan James, aka c0mrade.

He was born on December 12, 1983, in a small village called Pinecrest located in Miami-Dade County, Florida. His father was a computer programmer and his mother was a housewife....

Famous Hackers: The Story of Gary McKinnon.

A few months after the attacks on the World Trade Center, a strange message appeared on a U.S. Army computer: "Your security system is shit" it read. "I am Alone....

DuckDuckGo Updates Scam Blocker: Say Goodbye to Online Scams and Fake Sites!

The Scam Blocker tool built into DuckDuckGo browser has been updated to protect against online scams. Now detects fake e-commerce sites, cryptocurrency exchanges, and scareware. DuckDuckGo browser, which is entering public beta...

Cyberattacks on NFC contactless payments increase, new global threat

A new series of cyber attacks has been detected by ESET specialists, which sees the contactless payments sector with NFC technology as the protagonist. This type of attack was initially...

The Race to 0day! China Advances in Offensive Cyberpower, While the US Is Forced to Chase

China's growing rise has prompted U.S. officials to strongly emphasize the need to improve its offensive cyber capabilities. However, some doubts remain about the ability to meet the challenge, given...

Cyberbullying and Digital Terror: Why Betti’s Comic Makes You Feel Uncomfortable (and That’s a Good Thing)

When I decided to write this story of Betti, it was certainly not to make a “nice” or “easy” comic, to read on a sunny afternoon at the beach and...

Miniaturized Military Drone, Mosquito-Sized Model Arrives and China Offers It

In the military sector, the trend to miniaturize drones seems to know no limits, especially when the goal is to operate without being detected. An example of this race to...

Cyber Security: CISA and NSA Recommend Secure Programming Languages

The main US cybersecurity agencies, CISA and NSA, have published a joint document recommending that software developers opt for programming languages considered "memory safe". These languages are designed to provide...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE