Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Enterprise BusinessLog 320x200 1
Banner Ancharia Desktop 1 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

DriverFixer0428: macOS Credential Stealer Linked to North Korea Cybercrime

DriverFixer0428: macOS Credential Stealer Linked to North Korea

A thorough static and dynamic analysis has led to the identification of a macOS malware called DriverFixer0428 , classified as...
Redazione RHC - 25 December 2025
A $500 Tool Claims to Kill EDRs at Kernel Level: Inside the NtKiller Underground Ad Cybercrime

A $500 Tool Claims to Kill EDRs at Kernel Level: Inside the NtKiller Underground Ad

An ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention...
Redazione RHC - 25 December 2025
Webrat Malware Targets Security Researchers with GitHub Exploit Traps Cybercrime

Webrat Malware Targets Security Researchers with GitHub Exploit Traps

There's a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a...
Redazione RHC - 24 December 2025
Nezha Malware: Abusing Legitimate Tools for Remote Access Cybercrime

Nezha Malware: Abusing Legitimate Tools for Remote Access

There comes a moment, often too late, when you realize the problem didn't come from forcing the door, but from...
Redazione RHC - 24 December 2025
Massive Cloud Cyberespionage: PCPcat Hits 59,128 Servers in 48 Hours Cybercrime

Massive Cloud Cyberespionage: PCPcat Hits 59,128 Servers in 48 Hours

A large-scale, highly automated cyberespionage campaign is systematically targeting the cloud infrastructure that supports numerous modern web applications. In less...
Redazione RHC - 24 December 2025
Critical Net-SNMP Vulnerability Exposes Networks to RCE Attacks Cybercrime

Critical Net-SNMP Vulnerability Exposes Networks to RCE Attacks

A critical vulnerability has been discovered in the Net-SNMP software suite, widely used globally for network management and monitoring. The...
Redazione RHC - 24 December 2025

Asus Hacked: Everest Ransomware Group Claims Data Breach

Asus announced that one of its suppliers had been hacked. Meanwhile, the Everest ransomware group claimed to have stolen a terabyte of data from three companies: Asus, Qualcomm, and ArcSoft....
Share on Facebook Share on LinkedIn Share on X

Fortinet Vulnerability: Critical FortiOS, FortiWeb, FortiProxy, FortiSwitchManager Update

A critical vulnerability affecting the FortiOS, FortiWeb, FortiProxy , and FortiSwitchManager product lines has been reported by Fortinet via an urgent security advisory. This advisory was issued in connection with...
Share on Facebook Share on LinkedIn Share on X

Cybersecurity Certifications: Boost Your Career with CompTIA Security+

The cybersecurity landscape in Europe and Italy is rapidly evolving: increasing digitalization, regulations such as GDPR and NIS2, and the exponential increase in cyberattacks make it essential to invest in...
Share on Facebook Share on LinkedIn Share on X

US Allows Nvidia to Sell Advanced AI Chips to China, Easing Export Restrictions

It seems the White House isn't entirely clear ... at least judging by yet another change of heart regarding the sale of Nvidia's advanced chips to China, with the Trump...
Share on Facebook Share on LinkedIn Share on X

Taiwan Cracks Down on Submarine Cable Sabotage with New Laws

In recent years, Taiwan's underwater infrastructure—electricity cables, gas pipelines, and water systems—has been damaged on several occasions, particularly communications cables. On December 9, the Legislative Yuan passed a third reading...
Share on Facebook Share on LinkedIn Share on X

Ransomware Attacks Decline in 2024, But Threat Remains High with $734M in Ransom

According to a recently released report by the Financial Crimes Enforcement Network (FinCEN) , global ransomware activity peaked in 2023, only to plummet in 2024. This decline is attributed to...
Share on Facebook Share on LinkedIn Share on X

Embracing Vulnerability for Authentic Leadership and Team Growth

We're connected, connected to everything, hyperconnected. Our professional and social lives are dictated by extremely tight deadlines and a constantly rising bar; we must push. We tacitly demand that we...
Share on Facebook Share on LinkedIn Share on X

CISA Warns: Avoid Personal VPNs for Secure Mobile Communications

In new mobile communications advisories, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a stern warning to smartphone owners : avoid using personal VPN services. The document, aimed...
Share on Facebook Share on LinkedIn Share on X

SAP Security Update Fixes Critical Code Injection Vulnerability in Solution Manager

SAP has just released its latest annual security update, which contains 14 new security bug fixes. Among them is a A critical “code injection” flaw in SAP Solution Manager poses...
Share on Facebook Share on LinkedIn Share on X

Passwordless Authentication: The Future of Secure Online Access

Using passwords to access online accounts is no longer as secure as it once was. In fact, passwords are now one of the most common vulnerabilities used by cybercriminals to...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoinnovation
NexPhone: Three operating systems in your pocket! The phone that challenges the very concept of a PC.
Redazione RHC - 23/01/2026

The question has been circulating for over ten years: can a smartphone really replace a computer? Over time, the industry has repeatedly attempted to provide a concrete answer, without ever reaching a definitive solution. From…

Immagine del sitoCybercrime
BlueNoroff: The Hacker Group Revolutionizing Cybercrime
Redazione RHC - 23/01/2026

The BlueNoroff hacker group has long since transformed cybercrime into a high-tech business, with tens of millions of dollars, cryptocurrency assets, and entire financial ecosystems at stake. A report by Picus Security details the group’s…

Immagine del sitoCybercrime
Nearly 2,000 bugs in 100 dating apps: How your data can be stolen
Redazione RHC - 23/01/2026

A study of 100 dating apps revealed a disturbing picture: nearly 2,000 vulnerabilities were detected, 17% of which were classified as critical. The analysis was conducted by AppSec Solutions. The study’s results were published by…

Immagine del sitoCybercrime
MacSync: The macOS malware that empties your wallet… after weeks
Redazione RHC - 23/01/2026

A new malware campaign has emerged in the macOS world, one that relies not on sophisticated exploits, but on good old-fashioned social engineering. It’s powered by the MacSync malware, distributed using the ” malware-as-a-service ”…

Immagine del sitoCybercrime
Larva-25012 Proxyjacking Campaign Targets South Korea with Notepad++ Malware
Redazione RHC - 22/01/2026

A sophisticated proxyjacking campaign is targeting systems in South Korea, attributed to the actor Larva-25012 , which distributes proxyware disguised as legitimate Notepad++ installers. The campaign demonstrates significant technical evolution, using process injection in explorer.exe…