Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

LECS 970x120 1
Precedente Successivo

Latest news

Apache Struts 2 Vulnerability CVE-2025-68493 Exposes Sensitive Data Cyber News

Apache Struts 2 Vulnerability CVE-2025-68493 Exposes Sensitive Data

A new flaw has emerged in the foundation of one of the most popular Java frameworks on the web. Cybersecurity...
Agostino Pellegrino - January 12, 2026
Uncovering Dark AI: The Truth Behind Crime-as-a-Service Chatbots Cyber News

Uncovering Dark AI: The Truth Behind Crime-as-a-Service Chatbots

In recent months, the cybersecurity landscape has been awash with media hype surrounding new AI Dark Chatbots promoted as "Crime-as-a-Service"...
Bajram Zeqiri - January 12, 2026
AI-Generated Mac Malware: SimpleStealth Threatens User Security Cyber News

AI-Generated Mac Malware: SimpleStealth Threatens User Security

A group of industry specialists has identified for the first time a macOS malware whose code clearly shows signs of...
Massimiliano Brolli - January 11, 2026
The Future of Tech: Sovereignty, Security, and Cloud Control Cyber News

The Future of Tech: Sovereignty, Security, and Cloud Control

In today's world, technology is no longer a mere tool for efficiency or convenience, but a primary geopolitical lever ....
Silvia Felici - January 11, 2026
Internet Shutdowns Cost $19.7B in 2025, Sophisticated Censorship Rises Cyber News

Internet Shutdowns Cost $19.7B in 2025, Sophisticated Censorship Rises

Imagine a situation where the internet appears to be working, but websites won't open beyond the first screen, messaging apps...
Redazione RHC - January 11, 2026
Instagram Data Leak Exposes 17.5 Million Users on Dark Web Cyber News

Instagram Data Leak Exposes 17.5 Million Users on Dark Web

A massive digital archive containing the private information of approximately 17.5 million Instagram users appears to have fallen into the...
Redazione RHC - January 10, 2026

CVE-2025-47761: FortiClient VPN Zero-Day Exploit Lets Privilege Escalation

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies...

Ukrainian Hacker Charged in Major Ransomware Attacks

A Ukrainian man implicated in a series of ransomware attacks has been found guilty in the United States. These cybercrimes affected companies in several countries, including the United States, Canada,...

The Rise of Digital Walls: How National Sovereignty Threatens Global Internet

As we always report on these pages, nations are pushing for the development of domestic software and hardware devices, that is, technologies developed within the nation that are more easily...

Critical MongoDB Vulnerability Exposed: CVE-2025-14847

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data...

Smart TV Spying: Major Brands Accused of Collecting User Data

Texas Attorney General Ken Paxton has charged five major television manufacturers with illegally collecting user data using automatic content recognition (ACR) technology to record what owners watch. The charges concern...

Phishing Campaigns Exploit File Sharing Services

Researchers at Check Point, a pioneer and global leader in cybersecurity solutions, have discovered a phishing campaign in which attackers pose as file-sharing and electronic signature services to send financially-themed...

RansomHouse Ransomware Upgraded: Enhanced Encryption Threat

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption...

Cyber Attacks on the Rise: Wiper Malware and Data Destruction in 2025

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers...

MS13-089 Ransomware: Double Extortion Without Encryption

MS13-089 opens a leak site on the dark web, exposes the first data and adopts a double extortion strategy without encryption. A brand built on an old Microsoft ID For...

OAuth Device Code Phishing: New Attack Vector for Account Takeover

Cybercriminals are getting smarter and have found a new way to exploit corporate security protocols. It seems incredible, but it's true: they're using a legitimate Microsoft authentication feature to steal...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE