Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
TM RedHotCyber 320x100 042514
970x20 Itcentric

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Critical Windows PowerShell Vulnerability CVE-2025-54100: Update Now Cybercrime

Critical Windows PowerShell Vulnerability CVE-2025-54100: Update Now

An urgent security update has been released to address a critical vulnerability in Windows PowerShell that allows attackers to execute...
Redazione RHC - 12 December 2025
Telegram Losing Ground to Crackdown on Cybercrime Activities Cybercrime

Telegram Losing Ground to Crackdown on Cybercrime Activities

Telegram, which over the course of its history has become one of the most popular messaging apps in the world,...
Redazione RHC - 12 December 2025
Notepad++ Vulnerability Fixed: Update to 8.8.9 to Avoid Malware Cybercrime

Notepad++ Vulnerability Fixed: Update to 8.8.9 to Avoid Malware

Notepad++ is often targeted by attackers because the software is popular and widely used. A recently discovered vulnerability in the...
Redazione RHC - 11 December 2025
NetSupport RAT Malware Campaign Uncovered: Expert Analysis Cybercrime

NetSupport RAT Malware Campaign Uncovered: Expert Analysis

Securonix specialists have discovered a multi-layered malware campaign aimed at secretly installing the NetSupport RAT remote access tool . The...
Redazione RHC - 11 December 2025
Digital Stress: How to Achieve Balance in a Hyper-Connected World Cybercrime

Digital Stress: How to Achieve Balance in a Hyper-Connected World

We live in dissociation: we praise work-life balance, yet we find ourselves constantly online, like puppets on invisible strings. The...
Daniela Farina - 11 December 2025
DeadLock Ransomware Exploits Baidu Antivirus Vulnerability for EDR Bypass Cybercrime

DeadLock Ransomware Exploits Baidu Antivirus Vulnerability for EDR Bypass

Cisco Talos has identified a new ransomware campaign called DeadLock : attackers are exploiting a vulnerable Baidu antivirus driver (CVE-2024-51324)...
Redazione RHC - 11 December 2025

Cryptomixer Shut Down: Europol Cracks Down on $1.3B Bitcoin Mixing Service

Law enforcement agencies in Switzerland and Germany have reported the dismantling of Cryptomixer , a major mixing service operating since 2016 that helped criminals launder illicitly obtained funds. According to...
Share on Facebook Share on LinkedIn Share on X

888 Data Leaker: Ryanair Breach Exposed

In the underground forum landscape, there are actors who operate episodically, seeking a single media hit, and others who build an almost industrial pipeline of compromises over time, releasing technical...
Share on Facebook Share on LinkedIn Share on X

WiFi Network Security: Protect Against Hacking with WPA3 and ARP Spoofing

In today's environment, securing a network requires much more than setting a complex password. A cyber attack against a wireless network follows a structured path that evolves from passive monitoring...
Share on Facebook Share on LinkedIn Share on X

ShadyPanda Malware Infects 4.3M Browsers with Chrome Edge Extensions

Researchers at Koi Security described a multi-stage operation called ShadyPanda . Over the course of seven years, attackers released seemingly useful extensions for Chrome and Edge, built up an audience...
Share on Facebook Share on LinkedIn Share on X

The Dark Side of Internet Control: Durov’s Warning

Post 462 on Durov's official channel immediately went into “scream mode”: “ The end of the free internet. The free internet is becoming a tool of control .” No birthday...
Share on Facebook Share on LinkedIn Share on X

Phishing Attacks Surge in Black Friday Season: Stay Vigilant

This year, too, cybercriminals are taking advantage of seasonal shopping periods to spread phishing websites and fraudulent promotions, aiming to steal personal information and payment details . Gaming platforms remain...
Share on Facebook Share on LinkedIn Share on X

Human Washing Machine Launched: Japan’s Science Unveils Unique Device

Japanese company Science has launched a washing machine for humans. The 2.30-meter-long capsule bathes a person in 15 minutes and attracted considerable interest at the recently concluded Osaka Expo. The...
Share on Facebook Share on LinkedIn Share on X

Brazilian Systems Targeted in Sophisticated OAST Exploit Campaign

Security researchers have discovered a sophisticated exploit campaign that leverages a private out-of-band application security testing (OAST) service hosted on Google Cloud infrastructure. The campaign primarily targets systems in Brazil...
Share on Facebook Share on LinkedIn Share on X

Australian Man Jailed for Evil Twin Wi-Fi Scam Targeting Airline Passengers

An Australian court has convicted a 44-year-old man who stole the personal data of airline passengers and airport visitors over several months . He was sentenced to seven years and...
Share on Facebook Share on LinkedIn Share on X

KrakenBite Phishing Service Exposed

The underground cybercrime market continues to evolve rapidly, fueled by specialized groups designing and selling tools for increasingly sophisticated digital scams. Among these, a particularly active player in recent weeks...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCulture
Long-Lived Technologies: COBOL, C, SQL, and Legacy Systems
Redazione RHC - 02/01/2026

While the industry debates which neural network is the “smartest” and which framework is the “most modern,” decades-old technologies continue to quietly swirl beneath the surface of the banking industry . This year, COBOL turned…

Immagine del sitoCybercrime
Finland Seizes Ship in Cable Damage Probe, Cites Security Threat
Redazione RHC - 31/12/2025

On Wednesday, December 31, Finnish authorities seized a cargo ship believed to be involved in the damage to an undersea telecommunications cable connecting Helsinki to Tallinn, Estonia. The action was triggered after a technical anomaly…

Immagine del sitoCybercrime
Ransomware Attacks on the Rise: US Professionals Turn to Cybercrime
Redazione RHC - 31/12/2025

In the landscape of cybercrime investigations, some cases take on particular significance not only because of the extent of the financial damage, but also because of the profile of the individuals involved . Ransomware investigations,…

Immagine del sitoCybercrime
The Dark Side of Cybercrime: Human Costs and Consequences
Redazione RHC - 31/12/2025

By 2025, cybercrime will increasingly go beyond “just money”: attacks aren’t just about downtime bills and ransom payments , but also about real human consequences, from healthcare disruptions and victim harassment to kidnappings, torture, and…

Immagine del sitoCybercrime
OpenAI Hiring Chief Security Officer to Mitigate AI Risks
Redazione RHC - 30/12/2025

OpenAI, the developer of ChatGPT, has announced the search for a new Chief Security Officer . The position, with an annual salary of $555,000, will be directly responsible for mitigating risks associated with artificial intelligence…