Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Crowdstriker 970×120
Precedente Successivo

Latest news

Cybercrime Meets Real-Life Violence: Foxtrot Network’s Dark Side Cyber News

Cybercrime Meets Real-Life Violence: Foxtrot Network’s Dark Side

In recent months, there has been increasing talk of a paradigm shift in cybercrime . What for years was perceived...
Redazione RHC - January 13, 2026
Burnout in Cybersecurity: The Hidden Risk to Your Organization Culture

Burnout in Cybersecurity: The Hidden Risk to Your Organization

In the world of cybersecurity, we often talk about attacks, vulnerabilities, and incidents. Less is said about a silent variable...
Paloma Donadi - January 13, 2026
APT28 Phishing Campaign: Credential Harvesting Tactics Cybercrime

APT28 Phishing Campaign: Credential Harvesting Tactics

The threat actor APT28 , classified as an Advanced Persistent Threat, active since at least 2004, identified by the alias...
Lorenzo Nardi - January 13, 2026
Iran Cyber Crisis: Connettività Compromised Cybercrime

Iran Cyber Crisis: Connettività Compromised

Sometimes important things don't arrive at a press conference. They arrive like a graph that stops breathing: the connectivity line...
Roberto Villani - January 13, 2026
Poisoning AI Data: The New Threat to Machine Learning Models Cyber News

Poisoning AI Data: The New Threat to Machine Learning Models

A bold new initiative has been launched in the artificial intelligence industry to weaken machine learning models by deliberately distorting...
Luca Vinciguerra - January 12, 2026
Pig Butchering Scams Evolve with PBaaS: The New Threat Cyber News

Pig Butchering Scams Evolve with PBaaS: The New Threat

Online scams known as "pig butchering" are undergoing a profound transformation. From artisanal and disorganized operations , based on makeshift...
Bajram Zeqiri - January 12, 2026

TIME’s Machine of the Year: How Personal Computer Changed Society

TIME magazine's selection of a "Person of the Year" is a tradition dating back to 1927, when the award was given to Charles Lindbergh after his historic solo crossing of...

Livewire Vulnerability Exposed: 130k Apps at Risk of Remote Code Execution

An in-depth security analysis of Livewire , an essential framework for developing dynamic interfaces in Laravel, has revealed a significant vulnerability. Synacktiv security experts have identified a critical flaw and...

DriverFixer0428: macOS Credential Stealer Linked to North Korea

A thorough static and dynamic analysis has led to the identification of a macOS malware called DriverFixer0428 , classified as a credential stealer and attributed with a medium-high confidence level...

A $500 Tool Claims to Kill EDRs at Kernel Level: Inside the NtKiller Underground Ad

An ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes "NtKiller,"...

Webrat Malware Targets Security Researchers with GitHub Exploit Traps

There's a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written...

Nezha Malware: Abusing Legitimate Tools for Remote Access

There comes a moment, often too late, when you realize the problem didn't come from forcing the door, but from using the house keys. This is what happens when a...

Massive Cloud Cyberespionage: PCPcat Hits 59,128 Servers in 48 Hours

A large-scale, highly automated cyberespionage campaign is systematically targeting the cloud infrastructure that supports numerous modern web applications. In less than 48 hours, tens of thousands of servers have been...

Australia Boosts Papua New Guinea’s Digital Infra with New Undersea Cable

A new undersea cable funded by Australia under a recent mutual defence agreement with Papua New Guinea is set to strengthen the island country's digital infrastructure and ensure continuity of...

China Issues First Level 3 Autonomous Driving Licenses, Paving Way for Self-Driving Cars

On December 23, the Traffic Management Bureau of the Beijing Municipal Public Security Bureau officially issued the first batch of Level 3 autonomous driving license plates to three intelligent vehicles....

Spotify Web Scraping: Anna’s Archive Scrapes 300TB of Music Library

Activists and hackers at Anna's Archive have reportedly combed nearly the entire music library of the largest streaming service, Spotify. They claim to have collected metadata for 256 million tracks...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE