Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Mobile
Redhotcyber Banner Sito 970x120px Uscita 101125

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Interpol Operation Sentinel Cracks Down on Cybercrime with 574 Arrests Cybercrime

Interpol Operation Sentinel Cracks Down on Cybercrime with 574 Arrests

Interpol conducted Operation Sentinel, an international operation that resulted in the arrest of 574 people and the recovery of $3...
Redazione RHC - 27 December 2025
Villager Framework: AI-Powered Penetration Testing Tool Cybercrime

Villager Framework: AI-Powered Penetration Testing Tool

Straiker's AI Research (STAR) team has identified Villager, a native AI-based penetration testing framework developed by the Chinese group Cyberspike...
Redazione RHC - 26 December 2025
TIME’s Machine of the Year: How Personal Computer Changed Society Culture

TIME’s Machine of the Year: How Personal Computer Changed Society

TIME magazine's selection of a "Person of the Year" is a tradition dating back to 1927, when the award was...
Redazione RHC - 26 December 2025
Livewire Vulnerability Exposed: 130k Apps at Risk of Remote Code Execution Cybercrime

Livewire Vulnerability Exposed: 130k Apps at Risk of Remote Code Execution

An in-depth security analysis of Livewire , an essential framework for developing dynamic interfaces in Laravel, has revealed a significant...
Redazione RHC - 26 December 2025
Microsoft Boosts BitLocker with Hardware Acceleration for Enhanced Security Cybercrime

Microsoft Boosts BitLocker with Hardware Acceleration for Enhanced Security

Over the years, Microsoft has strived to keep BitLocker's performance impact within reasonable limits, historically below double digits. The goal...
Redazione RHC - 25 December 2025
DriverFixer0428: macOS Credential Stealer Linked to North Korea Cybercrime

DriverFixer0428: macOS Credential Stealer Linked to North Korea

A thorough static and dynamic analysis has led to the identification of a macOS malware called DriverFixer0428 , classified as...
Redazione RHC - 25 December 2025

Ink Dragon Hackers Uncovered: Sophisticated Cyber Espionage Operation

It was only a matter of time. Governments around the world have now put their security systems on high alert. Indeed, a large-scale espionage operation conducted by a group of...
Share on Facebook Share on LinkedIn Share on X

Google Discontinues Dark Web Report, Shifts to Active Protection

No more useless alerts. No more passive monitoring. Less than two years after its launch, Google has decided to shut down one of the most talked-about digital security tools: the...
Share on Facebook Share on LinkedIn Share on X

CyberVolk Ransomware Flawed: Free File Recovery Possible

This isn't the first time criminal hackers make mistakes, and it won't be the last. The pro-Russian hacktivist group CyberVolk launched the RaaS service VolkLocker (also known as CyberVolk 2.x)....
Share on Facebook Share on LinkedIn Share on X

OSINT Ethics and Legality: Navigating Open Source Intelligence

Open Source Intelligence (OSINT) has emerged in recent years as one of the most fascinating, yet most insidious, disciplines in the information and security landscape. Its essence is remarkably simple:...
Share on Facebook Share on LinkedIn Share on X

The Psychology of Passwords: Why Weak Passwords Persist

The psychology of passwords starts right here: trying to understand people before systems. Welcome to "The Mind Behind Passwords," the column that looks at cybersecurity. From a different perspective: that...
Share on Facebook Share on LinkedIn Share on X

Russian Cyber Operations Shift to Targeting Western Critical Infrastructure

New details emerge from an Amazon Threat Intelligence report that highlight an alarming shift in Russian government-backed cyber operations. High-level 0-day exploits, often attributed to state-sponsored actors, have seen a...
Share on Facebook Share on LinkedIn Share on X

Google Chrome Security Update Fixes Critical Vulnerabilities

A significant security update has been released by Google for the stable desktop channel, which addresses two very serious vulnerabilities that could expose users to potential memory leak attacks. As...
Share on Facebook Share on LinkedIn Share on X

Spiderman Phishing Kit Targets European Banks and Crypto Users

Varonis researchers have discovered a new PhaaS platform, called Spiderman, that targets users of European banks and cryptocurrency services. Attackers use the service to create copies of legitimate websites to...
Share on Facebook Share on LinkedIn Share on X

AI Smart Glasses for Police: Efficient Vehicle Checks in China

The Changsha traffic police have begun using AI-powered smart glasses in their daily patrols. This was confirmed by the city's Public Security Bureau , which has already distributed the new...
Share on Facebook Share on LinkedIn Share on X

Notepad++ 8.8.9 Released: Fixing Critical Update Vulnerability

A new version, 8.8.9, of the popular text editor Notepad++, has been released by its developers, fixing a flaw in the automatic update system . This issue came to light...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Instagram Data Leak Exposes 17.5 Million Users on Dark Web
Redazione RHC - 10/01/2026

A massive digital archive containing the private information of approximately 17.5 million Instagram users appears to have fallen into the hands of cybercriminals. A few hours ago, the alarm was raised after several Reddit users…

Immagine del sitoCybercrime
Undertow Vulnerability CVE-2025-12543 Exposes Java Ecosystem to Critical Security Risks
Redazione RHC - 09/01/2026

A flaw has been discovered in the foundation of the Java web ecosystem. Undertow , the high-performance web server that powers enterprise heavyweights like WildFly and JBoss EAP , has been hit by a critical…

Immagine del sitoCybercrime
Iran Protests Escalate as Reza Pahlavi Calls for Action Against Government
Redazione RHC - 09/01/2026

Iranian protesters chanted and marched through the streets until Friday morning, following a call from exiled former Prince Reza Pahlavi to demonstrate, despite the Iranian theocracy cutting off the country from the internet and international…

Immagine del sitoCybercrime
Veeam Backup Vulnerability: Critical RCE Flaw Discovered – Update Now
Redazione RHC - 08/01/2026

Backups are generally considered the last line of defense, but this week Veeam reminded us that backup systems themselves can become entry points for attacks. The company released security updates for Backup & Replication ,…

Immagine del sitoCybercrime
When Attack Discovery Becomes Automated, Detection Stops Scaling
Alexander Rogan - 08/01/2026

For much of the past two decades, cybersecurity has been built on a simple assumption: malicious activity can be detected, analysed, and responded to before meaningful damage occurs. This assumption shaped everything from SOC design…