Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Crowdstrike 320×100
Banner Ancharia Desktop 1 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Spotify Web Scraping: Anna’s Archive Scrapes 300TB of Music Library Cybercrime

Spotify Web Scraping: Anna’s Archive Scrapes 300TB of Music Library

Activists and hackers at Anna's Archive have reportedly combed nearly the entire music library of the largest streaming service, Spotify....
Redazione RHC - 23 December 2025
CVE-2025-47761: FortiClient VPN Zero-Day Exploit Lets Privilege Escalation Vulnerability

CVE-2025-47761: FortiClient VPN Zero-Day Exploit Lets Privilege Escalation

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by...
Manuel Roccon - 23 December 2025
Ukrainian Hacker Charged in Major Ransomware Attacks Cybercrime

Ukrainian Hacker Charged in Major Ransomware Attacks

A Ukrainian man implicated in a series of ransomware attacks has been found guilty in the United States. These cybercrimes...
Redazione RHC - 23 December 2025
The Rise of Digital Walls: How National Sovereignty Threatens Global Internet Cybercrime

The Rise of Digital Walls: How National Sovereignty Threatens Global Internet

As we always report on these pages, nations are pushing for the development of domestic software and hardware devices, that...
Redazione RHC - 23 December 2025
Critical MongoDB Vulnerability Exposed: CVE-2025-14847 Cybercrime

Critical MongoDB Vulnerability Exposed: CVE-2025-14847

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security...
Redazione RHC - 23 December 2025
Smart TV Spying: Major Brands Accused of Collecting User Data Cybercrime

Smart TV Spying: Major Brands Accused of Collecting User Data

Texas Attorney General Ken Paxton has charged five major television manufacturers with illegally collecting user data using automatic content recognition...
Redazione RHC - 23 December 2025

Gartner Warns: AI-Powered Browsers Pose Significant Security Risks to Businesses

Gartner analysts have urged businesses to temporarily stop using browsers with built-in artificial intelligence (AI) capabilities . In a recent advisory, the company emphasizes that such tools pose unnecessary risks...
Share on Facebook Share on LinkedIn Share on X

Asus Hacked: Everest Ransomware Group Claims Data Breach

Asus announced that one of its suppliers had been hacked. Meanwhile, the Everest ransomware group claimed to have stolen a terabyte of data from three companies: Asus, Qualcomm, and ArcSoft....
Share on Facebook Share on LinkedIn Share on X

Fortinet Vulnerability: Critical FortiOS, FortiWeb, FortiProxy, FortiSwitchManager Update

A critical vulnerability affecting the FortiOS, FortiWeb, FortiProxy , and FortiSwitchManager product lines has been reported by Fortinet via an urgent security advisory. This advisory was issued in connection with...
Share on Facebook Share on LinkedIn Share on X

Cybersecurity Certifications: Boost Your Career with CompTIA Security+

The cybersecurity landscape in Europe and Italy is rapidly evolving: increasing digitalization, regulations such as GDPR and NIS2, and the exponential increase in cyberattacks make it essential to invest in...
Share on Facebook Share on LinkedIn Share on X

US Allows Nvidia to Sell Advanced AI Chips to China, Easing Export Restrictions

It seems the White House isn't entirely clear ... at least judging by yet another change of heart regarding the sale of Nvidia's advanced chips to China, with the Trump...
Share on Facebook Share on LinkedIn Share on X

Taiwan Cracks Down on Submarine Cable Sabotage with New Laws

In recent years, Taiwan's underwater infrastructure—electricity cables, gas pipelines, and water systems—has been damaged on several occasions, particularly communications cables. On December 9, the Legislative Yuan passed a third reading...
Share on Facebook Share on LinkedIn Share on X

Ransomware Attacks Decline in 2024, But Threat Remains High with $734M in Ransom

According to a recently released report by the Financial Crimes Enforcement Network (FinCEN) , global ransomware activity peaked in 2023, only to plummet in 2024. This decline is attributed to...
Share on Facebook Share on LinkedIn Share on X

Embracing Vulnerability for Authentic Leadership and Team Growth

We're connected, connected to everything, hyperconnected. Our professional and social lives are dictated by extremely tight deadlines and a constantly rising bar; we must push. We tacitly demand that we...
Share on Facebook Share on LinkedIn Share on X

CISA Warns: Avoid Personal VPNs for Secure Mobile Communications

In new mobile communications advisories, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a stern warning to smartphone owners : avoid using personal VPN services. The document, aimed...
Share on Facebook Share on LinkedIn Share on X

SAP Security Update Fixes Critical Code Injection Vulnerability in Solution Manager

SAP has just released its latest annual security update, which contains 14 new security bug fixes. Among them is a A critical “code injection” flaw in SAP Solution Manager poses...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCulture
Net-NTLMv1 Exploitation: Rainbow Tables for Modern Attacks
Redazione RHC - 18/01/2026

Mandiant has released a large set of rainbow tables dedicated to Net-NTLMv1 with the aim of concretely demonstrating how insecure this authentication protocol has become. Although Net-NTLMv1 has been deprecated for years and its weaknesses…

Immagine del sitoCybercrime
Your paycheck is zero! Congratulations, someone answered the phone wrong
Redazione RHC - 18/01/2026

No worker would accept their paycheck disappearing without explanation. It was precisely from a series of internal reports of this nature that an organization began investigating an apparently administrative anomaly, discovering instead a targeted cyber…

Immagine del sitoCybercrime
Two Ukrainians Suspected in Black Basta Ransomware Attacks
Redazione RHC - 17/01/2026

When it comes to cybersecurity, it’s not uncommon to come across news stories that seem straight out of a science fiction movie. Yet, the reality is even more surprising and sometimes disturbing. The story of…

Immagine del sitoCybercrime
Gootloader Malware Returns with Enhanced Evasion Techniques
Redazione RHC - 17/01/2026

After a long period of silence, the Gootloader downloader malware has returned to the forefront. Last November, the Huntress team detected a new campaign signaling the return of a developer previously associated with the Vanilla…

Immagine del sitoCybercrime
VoidLink Malware: Advanced Linux Framework Targets Cloud Infrastructures
Redazione RHC - 16/01/2026

Check Point researchers have discovered a new Linux infection framework distinguished by its advanced modular architecture and wide range of features. The malware has been dubbed VoidLink . The framework is composed of over 30…