Welcome to Red Hot Cyber | Cybersecurity News
Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
LECS 320x100 1
Banner Ancharia Desktop 1 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

LLM-Powered Malware: The Future of Autonomous Cyber Threats

Researchers at Netskope Threat Labs have just published a new analysis on the possibility of creating autonomous malware built exclusively...
Redazione RHC - 9 December 2025

Intellexa Exploits Zero-Day Vulnerabilities with Spyware

Despite significant geopolitical challenges, the mercenary spyware industry remains a resilient and persistent threat; in this context, the well-known vendor...
Redazione RHC - 8 December 2025

Malaysia Cracks Down on Bitcoin Mining Thefts

Thieves usually target tangible assets: cash or non-cash, jewelry, cars. But with cryptocurrencies, things are much stranger. Malaysian police are...
Redazione RHC - 8 December 2025

Australia Bans Social Media for Under 16s: What You Need to Know

Australia is soon to introduce groundbreaking legislation banning social media access for children under 16, an initiative that will set...
Redazione RHC - 8 December 2025

Palo Alto Networks VPN Vulnerability Exploited by Hackers

An increasingly aggressive campaign, directly targeting remote access infrastructure, has prompted threat actors to actively attempt to exploit vulnerabilities in...
Redazione RHC - 8 December 2025

US Brothers Accused of Destroying 96 Databases with AI

The U.S. Department of Justice has accused twin brothers Muneeb and Sohaib Akhter of deleting 96 databases containing sensitive information,...
Redazione RHC - 8 December 2025

LLM-Powered Malware: The Future of Autonomous Cyber Threats

Researchers at Netskope Threat Labs have just published a new analysis on the possibility of creating autonomous malware built exclusively from Large Language Models (LLMs), eliminating the need to encode...
Facebook Linkedin X

Intellexa Exploits Zero-Day Vulnerabilities with Spyware

Despite significant geopolitical challenges, the mercenary spyware industry remains a resilient and persistent threat; in this context, the well-known vendor Intellexa continues to expand its arsenal. A recent report from...
Facebook Linkedin X

Malaysia Cracks Down on Bitcoin Mining Thefts

Thieves usually target tangible assets: cash or non-cash, jewelry, cars. But with cryptocurrencies, things are much stranger. Malaysian police are hunting down around 14,000 illegal Bitcoin mining companies that have...
Facebook Linkedin X

Australia Bans Social Media for Under 16s: What You Need to Know

Australia is soon to introduce groundbreaking legislation banning social media access for children under 16, an initiative that will set a precedent worldwide. A similar measure will soon be adopted...
Facebook Linkedin X

Palo Alto Networks VPN Vulnerability Exploited by Hackers

An increasingly aggressive campaign, directly targeting remote access infrastructure, has prompted threat actors to actively attempt to exploit vulnerabilities in Palo Alto Networks' GlobalProtect VPN portals . On December 5,...
Facebook Linkedin X

US Brothers Accused of Destroying 96 Databases with AI

The U.S. Department of Justice has accused twin brothers Muneeb and Sohaib Akhter of deleting 96 databases containing sensitive information, including investigative records and documents requested under the Freedom of...
Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sito
Kimwolf Botnet: The Rising Threat of DDoS Attacks on IoT Devices
Redazione RHC - 20/12/2025

A new and formidable enemy has emerged in the cyber threat landscape: Kimwolf, a fearsome DDoS botnet, is having a devastating impact on devices worldwide. The consequences of this threat can be extremely serious, and…

Immagine del sito
54 Arrested in $Multi-Million ATM Jackpotting Scheme Linked to Tren de Aragua
Redazione RHC - 20/12/2025

A federal grand jury in the District of Nebraska has indicted a total of 54 people accused of participating in a vast criminal operation that used malware to steal millions of dollars from U.S. ATMs.…

Immagine del sito
The Birth of World Wide Web: How Tim Berners-Lee Created the First Website
Redazione RHC - 20/12/2025

There you have it! On December 20, 1990, something epochal happened at CERN in Geneva. Tim Berners-Lee , a British computer genius, created the first website in history, info.cern.ch , created with the aim of…

Immagine del sito
WatchGuard Firewall Zero-Day Vulnerability CVE-2025-14733 Exploited
Redazione RHC - 19/12/2025

A critical zero-day vulnerability, identified as CVE-2025-14733, has left network administrators on their knees, forcing them into a race against time to secure their systems. This flaw, with a CVSS score of 9.3 found on…

Immagine del sito
Linux Kernel CVE-2025-68260 Vulnerability Fixed: Rust Code at Risk
Redazione RHC - 19/12/2025

The world of technology is a veritable battlefield, where coding geniuses challenge malicious attackers every day with exploits and security patches. That’s why the recent discovery of a vulnerability in the Linux kernel has caused…