Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
HackTheBox 320x100 1
LECS 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Notepad++ 8.8.9 Released: Fixing Critical Update Vulnerability Cybercrime

Notepad++ 8.8.9 Released: Fixing Critical Update Vulnerability

A new version, 8.8.9, of the popular text editor Notepad++, has been released by its developers, fixing a flaw in...
Redazione RHC - 16 December 2025
Salt Typhoon Hackers Exposed: Cisco Training Led to Global Telecom Breaches Cybercrime

Salt Typhoon Hackers Exposed: Cisco Training Led to Global Telecom Breaches

A recent study by SentinelLabs sheds new light on the roots of the hacker group known as “Salt Typhoon ,”...
Redazione RHC - 16 December 2025
Critical Red Hat OpenShift GitOps Vulnerability Exposed Cybercrime

Critical Red Hat OpenShift GitOps Vulnerability Exposed

A critical flaw has been discovered in Red Hat OpenShift GitOps, putting Kubernetes clusters at risk by allowing users with...
Redazione RHC - 16 December 2025
FortiGate Vulnerability Exploited: Update Now to Prevent SSO Attacks Cybercrime

FortiGate Vulnerability Exploited: Update Now to Prevent SSO Attacks

Threat actors began actively exploiting the high-severity vulnerabilities shortly after the vendor disclosed them to bypass authentication on FortiGate devices....
Redazione RHC - 16 December 2025
Shannon: Autonomous Penetration Testing with AI Cybercrime

Shannon: Autonomous Penetration Testing with AI

Shannon acts as a penetration tester who doesn't just report vulnerabilities, but launches actual exploits. Shannon's goal is to breach...
Redazione RHC - 15 December 2025
Protecting Loved Ones from Scams and Financial Abuse Cybercrime

Protecting Loved Ones from Scams and Financial Abuse

Hi guys,My name is Giorgio , I'm 58 years old, I've always worked as an administrative technician, and in life,...
Redazione RHC - 15 December 2025

Maha Grass APT Group Unleashes StreamSpy Malware Attacks

The Patchwork cyber espionage group — also known as Hangover or Dropping Elephant and internally tracked by QiAnXin as APT-Q-36 — has been active since 2009 and is believed to...
Share on Facebook Share on LinkedIn Share on X

Digital Crime Among Teenagers: Temporary Involvement

Dutch authorities have published data showing that adolescents' involvement in cybercrime is usually temporary. An analysis prepared by the House of Representatives indicates that early interest in hacking often fades...
Share on Facebook Share on LinkedIn Share on X

Porsche Russia Alarm Issues Spark Widespread Vehicle Immobilization

Porsche owners in Russia are increasingly experiencing problems with factory alarms, making it impossible to use their cars. Their cars won't start, stall immediately after starting, or display engine-related errors...
Share on Facebook Share on LinkedIn Share on X

Cryptomixer Shut Down: Europol Cracks Down on $1.3B Bitcoin Mixing Service

Law enforcement agencies in Switzerland and Germany have reported the dismantling of Cryptomixer , a major mixing service operating since 2016 that helped criminals launder illicitly obtained funds. According to...
Share on Facebook Share on LinkedIn Share on X

888 Data Leaker: Ryanair Breach Exposed

In the underground forum landscape, there are actors who operate episodically, seeking a single media hit, and others who build an almost industrial pipeline of compromises over time, releasing technical...
Share on Facebook Share on LinkedIn Share on X

WiFi Network Security: Protect Against Hacking with WPA3 and ARP Spoofing

In today's environment, securing a network requires much more than setting a complex password. A cyber attack against a wireless network follows a structured path that evolves from passive monitoring...
Share on Facebook Share on LinkedIn Share on X

ShadyPanda Malware Infects 4.3M Browsers with Chrome Edge Extensions

Researchers at Koi Security described a multi-stage operation called ShadyPanda . Over the course of seven years, attackers released seemingly useful extensions for Chrome and Edge, built up an audience...
Share on Facebook Share on LinkedIn Share on X

The Dark Side of Internet Control: Durov’s Warning

Post 462 on Durov's official channel immediately went into “scream mode”: “ The end of the free internet. The free internet is becoming a tool of control .” No birthday...
Share on Facebook Share on LinkedIn Share on X

Phishing Attacks Surge in Black Friday Season: Stay Vigilant

This year, too, cybercriminals are taking advantage of seasonal shopping periods to spread phishing websites and fraudulent promotions, aiming to steal personal information and payment details . Gaming platforms remain...
Share on Facebook Share on LinkedIn Share on X

Human Washing Machine Launched: Japan’s Science Unveils Unique Device

Japanese company Science has launched a washing machine for humans. The 2.30-meter-long capsule bathes a person in 15 minutes and attracted considerable interest at the recently concluded Osaka Expo. The...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Microsoft Copilot Vulnerability Exposes User Data to Hackers
Redazione RHC - 15/01/2026

A recently fixed vulnerability allowed attackers to exploit Microsoft Copilot Personal with a single click to steal sensitive user data. Using a phishing link, attackers were able to take control of sessions without requiring further…

Immagine del sitoCybercrime
Progress Software Patches LoadMaster, MOVEit WAF Vulnerabilities
Redazione RHC - 15/01/2026

On January 12, 2026, Progress Software Corporation released patches that address two high-severity Command Injection vulnerabilities, which could allow remote attackers to execute malicious code on LoadMaster load balancers and MOVEit Web Application Firewalls (WAFs).…

Immagine del sitoCybercrime
24-Year-Old Hacker Breaches US Supreme Court Database
Redazione RHC - 14/01/2026

Do you remember the 24-year-old hacker Carmelo Miano and the breaches of the Naples Prosecutor’s Office’s accounts and computer systems? It appears something similar happened in the United States, and the other young man is…

Immagine del sitoCybercrime
Cloudflare vs Italy: The Battle for Internet Freedom and DNS Control
Redazione RHC - 14/01/2026

Cloudflare CEO Matthew Prince has threatened to shut down the company’s operations in Italy after the country’s telecom regulator fined it twice its annual revenue in the country. The facts The conflict erupted around Italy’s…

Immagine del sitoCybercrime
Cybercrime Meets Real-Life Violence: Foxtrot Network’s Dark Side
Redazione RHC - 13/01/2026

In recent months, there has been increasing talk of a paradigm shift in cybercrime . What for years was perceived as a predominantly digital ecosystem— consisting of fraud, identity theft, online extortion, and cyberattacks —is…