Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Fortinet 320x100px
Banner Ancharia Desktop 1 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Smart TV Spying: Major Brands Accused of Collecting User Data Cybercrime

Smart TV Spying: Major Brands Accused of Collecting User Data

Texas Attorney General Ken Paxton has charged five major television manufacturers with illegally collecting user data using automatic content recognition...
Redazione RHC - 23 December 2025
Phishing Campaigns Exploit File Sharing Services Cybercrime

Phishing Campaigns Exploit File Sharing Services

Researchers at Check Point, a pioneer and global leader in cybersecurity solutions, have discovered a phishing campaign in which attackers...
Redazione RHC - 23 December 2025
RansomHouse Ransomware Upgraded: Enhanced Encryption Threat Cybercrime

RansomHouse Ransomware Upgraded: Enhanced Encryption Threat

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks....
Redazione RHC - 22 December 2025
Cyber Attacks on the Rise: Wiper Malware and Data Destruction in 2025 Cybercrime

Cyber Attacks on the Rise: Wiper Malware and Data Destruction in 2025

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This...
Redazione RHC - 22 December 2025
MS13-089 Ransomware: Double Extortion Without Encryption Cybercrime

MS13-089 Ransomware: Double Extortion Without Encryption

MS13-089 opens a leak site on the dark web, exposes the first data and adopts a double extortion strategy without...
Inva Malaj - 22 December 2025
San Francisco Power Outage Exposes Waymo Self-Driving Car Vulnerabilities Cybercrime

San Francisco Power Outage Exposes Waymo Self-Driving Car Vulnerabilities

A massive power outage in San Francisco has disrupted self-driving vehicle traffic. Waymo self-driving vehicles have been spotted on city...
Redazione RHC - 22 December 2025

French Police Arrest Suspect in Cyberattack on Interior Ministry

French law enforcement has arrested a 22-year-old man suspected of carrying out a recent cyberattack on the Ministry of the Interior. The attack occurred in mid-December and targeted the agency's...
Share on Facebook Share on LinkedIn Share on X

Google Unveils Gemini 3 Flash AI Model, Rivals OpenAI GPT-5.2

The battle for AI leadership is increasingly moving from the lab to mass production. The day after the release of OpenAI GPT Image 1.5, Google unveiled the Gemini 3 Flash...
Share on Facebook Share on LinkedIn Share on X

Rise of AI Degrees: Students Shift from Computer Science to AI

A marked shift in college student preferences is taking place in the United States. More and more young people are choosing degrees in artificial intelligence, abandoning traditional computer science, which...
Share on Facebook Share on LinkedIn Share on X

SonicWall SMA1000 Vulnerability: Critical Security Patch Released

Researchers have discovered a vulnerability, identified as CVE-2025-40602, affecting SonicWall's SMA1000 series of secure access gateways. This flaw is particularly concerning because it could allow an attacker to escalate their...
Share on Facebook Share on LinkedIn Share on X

HPE OneView Vulnerability CVE-2025-37164: Critical Security Update Required

Cybersecurity is a serious issue, especially when it comes to vulnerabilities that can compromise an entire system. Well, Hewlett Packard Enterprise (HPE) has just raised the alarm about a truly...
Share on Facebook Share on LinkedIn Share on X

CISA Warns of Critical Vulnerabilities in Cisco, SonicWall, and ASUS Devices

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert including three new vulnerabilities in its catalog of exploited cyber threats (KEVs), highlighting that these flaws are currently...
Share on Facebook Share on LinkedIn Share on X

Critical Windows Admin Center Flaw CVE-2025-64669 Exposes Servers to Attack

A security flaw has been discovered in Microsoft's Windows Admin Center (WAC) . Essentially, a permissions error could allow any standard user to take control of a server. The Cymulate...
Share on Facebook Share on LinkedIn Share on X

Ink Dragon Hackers Uncovered: Sophisticated Cyber Espionage Operation

It was only a matter of time. Governments around the world have now put their security systems on high alert. Indeed, a large-scale espionage operation conducted by a group of...
Share on Facebook Share on LinkedIn Share on X

Google Discontinues Dark Web Report, Shifts to Active Protection

No more useless alerts. No more passive monitoring. Less than two years after its launch, Google has decided to shut down one of the most talked-about digital security tools: the...
Share on Facebook Share on LinkedIn Share on X

CyberVolk Ransomware Flawed: Free File Recovery Possible

This isn't the first time criminal hackers make mistakes, and it won't be the last. The pro-Russian hacktivist group CyberVolk launched the RaaS service VolkLocker (also known as CyberVolk 2.x)....
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Apple Supply Chain Hit by Cyberattack: Sensitive Data at Risk
Redazione RHC - 30/12/2025

During the first half of December, a Chinese company assembling devices for Apple was hit by an advanced cyberattack that may have exposed sensitive information related to a production line. The incident was reported by…

Immagine del sitoCybercrime
Browser-in-the-Browser Phishing Attack: How to Protect Yourself
Manuel Roccon - 29/12/2025

This article analyzes a recent and sophisticated phishing campaign that uses the Browser-in-the-Browser (BitB) technique to steal credentials, particularly those from services like Microsoft 365. The BitB attack is notable for its ability to generate…

Immagine del sitoCybercrime
Critical WebKit Vulnerability Exposes iOS Devices to Code Execution
Redazione RHC - 29/12/2025

A new report details a critical vulnerability discovered by security researcher Joseph Goydish in Apple’s WebKit engine. This security flaw, if exploited in conjunction with other exploits, could allow attackers to execute arbitrary code on…

Immagine del sitoCybercrime
Xspeeder Devices Hit by AI-Discovered Zero-Day Vulnerability CVE-2025-54322
Redazione RHC - 29/12/2025

When it comes to cybersecurity, it’s easy to fall into the trap of thinking that problems are always far away, that they only affect others. But the reality is that a vulnerability is always around…

Immagine del sitoCybercrime
Job Scams on Social Media: How to Avoid Fake Remote Job Offers
Redazione RHC - 29/12/2025

Fraudulent job ads promising easy money and remote work continue to flood social media, particularly in the Middle East and North Africa . Under the guise of part-time jobs that require no experience , scammers…