Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Ransomfeed 320x100 1
UtiliaCS 970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Finland Seizes Ship in Cable Damage Probe, Cites Security Threat Cybercrime

Finland Seizes Ship in Cable Damage Probe, Cites Security Threat

On Wednesday, December 31, Finnish authorities seized a cargo ship believed to be involved in the damage to an undersea...
Redazione RHC - 31 December 2025
Windows X-Lite 11: Optimize Your Old PC with This Lightweight Version Cybercrime

Windows X-Lite 11: Optimize Your Old PC with This Lightweight Version

On December 31st, for gamers and older computer users looking for maximum performance, the official version of Windows 11 often...
Redazione RHC - 31 December 2025
Crypto Malware Hacker Extradited to Korea for $1.18M Theft Cybercrime

Crypto Malware Hacker Extradited to Korea for $1.18M Theft

A hacker who stole over 1.7 billion won (about $1.18 million) in cryptocurrency using malware that secretly spoofed wallet addresses...
Redazione RHC - 31 December 2025
The Dark Side of Convenience: How Digital Payments Threaten Our Privacy Cybercrime

The Dark Side of Convenience: How Digital Payments Threaten Our Privacy

Five days in London, and I felt like I was living inside a permanent demo of the future. The sleek,...
Sandro Sana - 31 December 2025
Ransomware Attacks on the Rise: US Professionals Turn to Cybercrime Cybercrime

Ransomware Attacks on the Rise: US Professionals Turn to Cybercrime

In the landscape of cybercrime investigations, some cases take on particular significance not only because of the extent of the...
Redazione RHC - 31 December 2025
Apache StreamPipes Vulnerability: Update to Prevent Admin Takeover Cybercrime

Apache StreamPipes Vulnerability: Update to Prevent Admin Takeover

Apache StreamPipes is an open-source platform for real-time data analysis and processing (streaming analytics) , designed especially for IoT, Industry...
Redazione RHC - 31 December 2025

Russian Cyber Operations Shift to Targeting Western Critical Infrastructure

New details emerge from an Amazon Threat Intelligence report that highlight an alarming shift in Russian government-backed cyber operations. High-level 0-day exploits, often attributed to state-sponsored actors, have seen a...
Share on Facebook Share on LinkedIn Share on X

Google Chrome Security Update Fixes Critical Vulnerabilities

A significant security update has been released by Google for the stable desktop channel, which addresses two very serious vulnerabilities that could expose users to potential memory leak attacks. As...
Share on Facebook Share on LinkedIn Share on X

Spiderman Phishing Kit Targets European Banks and Crypto Users

Varonis researchers have discovered a new PhaaS platform, called Spiderman, that targets users of European banks and cryptocurrency services. Attackers use the service to create copies of legitimate websites to...
Share on Facebook Share on LinkedIn Share on X

AI Smart Glasses for Police: Efficient Vehicle Checks in China

The Changsha traffic police have begun using AI-powered smart glasses in their daily patrols. This was confirmed by the city's Public Security Bureau , which has already distributed the new...
Share on Facebook Share on LinkedIn Share on X

Notepad++ 8.8.9 Released: Fixing Critical Update Vulnerability

A new version, 8.8.9, of the popular text editor Notepad++, has been released by its developers, fixing a flaw in the automatic update system . This issue came to light...
Share on Facebook Share on LinkedIn Share on X

Salt Typhoon Hackers Exposed: Cisco Training Led to Global Telecom Breaches

A recent study by SentinelLabs sheds new light on the roots of the hacker group known as “Salt Typhoon ,” which carried out one of the most audacious espionage operations...
Share on Facebook Share on LinkedIn Share on X

Critical Red Hat OpenShift GitOps Vulnerability Exposed

A critical flaw has been discovered in Red Hat OpenShift GitOps, putting Kubernetes clusters at risk by allowing users with reduced permissions to gain full control of them. OpenShift GitOps...
Share on Facebook Share on LinkedIn Share on X

FortiGate Vulnerability Exploited: Update Now to Prevent SSO Attacks

Threat actors began actively exploiting the high-severity vulnerabilities shortly after the vendor disclosed them to bypass authentication on FortiGate devices. A recent report from Arctic Wolf reveals that, as of...
Share on Facebook Share on LinkedIn Share on X

Shannon: Autonomous Penetration Testing with AI

Shannon acts as a penetration tester who doesn't just report vulnerabilities, but launches actual exploits. Shannon's goal is to breach your web application's security before anyone with malicious intent can....
Share on Facebook Share on LinkedIn Share on X

Protecting Loved Ones from Scams and Financial Abuse

Hi guys,My name is Giorgio , I'm 58 years old, I've always worked as an administrative technician, and in life, I've always been the " rational " one in the...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Larva-25012 Proxyjacking Campaign Targets South Korea with Notepad++ Malware
Redazione RHC - 22/01/2026

A sophisticated proxyjacking campaign is targeting systems in South Korea, attributed to the actor Larva-25012 , which distributes proxyware disguised as legitimate Notepad++ installers. The campaign demonstrates significant technical evolution, using process injection in explorer.exe…

Immagine del sitoCybercrime
PurpleBravo’s Contagious Interview: Malware Campaign Targets Global Firms
Redazione RHC - 22/01/2026

For over a year, the North Korean group PurpleBravo has been running a targeted malware campaign called “Contagious Interview,” using fake job interviews to attack companies in Europe, Asia, the Middle East, and Central America.…

Immagine del sitoCybercrime
KONNI Malware Targets Crypto Developers with AI-Powered Attacks
Redazione RHC - 22/01/2026

Check Point Research recently discovered a sophisticated phishing campaign orchestrated by KONNI , a threat group linked to North Korea . Historically focused on diplomatic targets in South Korea, the malicious actor has now expanded…

Immagine del sitoCybercrime
Fortinet FortiOS Vulnerability Exploited: CVE-2025-59718 Patch Bypass
Redazione RHC - 22/01/2026

Attackers are exploiting a previously patched critical FortiGate authentication flaw (CVE-2025-59718) through a patch bypass method to breach protected firewalls, as Fortinet customers are experiencing. Fortinet reportedly plans to soon release FortiOS versions 7.4.11, 7.6.6,…

Immagine del sitoCybercrime
Cisco Zero-Day Vulnerability CVE-2026-20045 Actively Exploited
Redazione RHC - 22/01/2026

A critical zero-day remote code execution (RCE) vulnerability, identified as CVE-2026-20045, has been discovered by Cisco and is being actively exploited in active attacks. Cisco has urged immediate patching, and its Product Security Incident Response…