Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

970x20 Itcentric
Precedente Successivo

Latest news

China Issues First Level 3 Autonomous Driving Licenses, Paving Way for Self-Driving Cars Cyber News

China Issues First Level 3 Autonomous Driving Licenses, Paving Way for Self-Driving Cars

On December 23, the Traffic Management Bureau of the Beijing Municipal Public Security Bureau officially issued the first batch of...
Redazione RHC - December 23, 2025
Nvidia H200 Chip Shipments to China Set to Begin Cyber News

Nvidia H200 Chip Shipments to China Set to Begin

Nvidia has informed its customers in China of its intention to begin shipping the first H200 chip, the company's second-most...
Redazione RHC - December 23, 2025
La Poste Hit by Pro-Russian DDoS Attack During Peak Holiday Season Cyber News

La Poste Hit by Pro-Russian DDoS Attack During Peak Holiday Season

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in...
Redazione RHC - December 23, 2025
Spotify Web Scraping: Anna’s Archive Scrapes 300TB of Music Library Cyber News

Spotify Web Scraping: Anna’s Archive Scrapes 300TB of Music Library

Activists and hackers at Anna's Archive have reportedly combed nearly the entire music library of the largest streaming service, Spotify....
Stefano Gazzella - December 23, 2025
CVE-2025-47761: FortiClient VPN Zero-Day Exploit Lets Privilege Escalation Vulnerability

CVE-2025-47761: FortiClient VPN Zero-Day Exploit Lets Privilege Escalation

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by...
Manuel Roccon - December 23, 2025
Ukrainian Hacker Charged in Major Ransomware Attacks Cyber News

Ukrainian Hacker Charged in Major Ransomware Attacks

A Ukrainian man implicated in a series of ransomware attacks has been found guilty in the United States. These cybercrimes...
Agostino Pellegrino - December 23, 2025

888 Data Leaker: Ryanair Breach Exposed

In the underground forum landscape, there are actors who operate episodically, seeking a single media hit, and others who build an almost industrial pipeline of compromises over time, releasing technical...

WiFi Network Security: Protect Against Hacking with WPA3 and ARP Spoofing

In today's environment, securing a network requires much more than setting a complex password. A cyber attack against a wireless network follows a structured path that evolves from passive monitoring...

ShadyPanda Malware Infects 4.3M Browsers with Chrome Edge Extensions

Researchers at Koi Security described a multi-stage operation called ShadyPanda . Over the course of seven years, attackers released seemingly useful extensions for Chrome and Edge, built up an audience...

The Dark Side of Internet Control: Durov’s Warning

Post 462 on Durov's official channel immediately went into “scream mode”: “ The end of the free internet. The free internet is becoming a tool of control .” No birthday...

Brazilian Systems Targeted in Sophisticated OAST Exploit Campaign

Security researchers have discovered a sophisticated exploit campaign that leverages a private out-of-band application security testing (OAST) service hosted on Google Cloud infrastructure. The campaign primarily targets systems in Brazil...

Australian Man Jailed for Evil Twin Wi-Fi Scam Targeting Airline Passengers

An Australian court has convicted a 44-year-old man who stole the personal data of airline passengers and airport visitors over several months . He was sentenced to seven years and...

KrakenBite Phishing Service Exposed

The underground cybercrime market continues to evolve rapidly, fueled by specialized groups designing and selling tools for increasingly sophisticated digital scams. Among these, a particularly active player in recent weeks...

ADC Aerospace Hit by Play Ransomware Attack, Data Breach Feared

American aviation and defense components manufacturer ADC Aerospace has found itself in the spotlight due to a possible cyber attack by the Play ransomware group, which appeared on their blog...

Microsoft 365 Security Risk: Interface Poisoning Attacks

This article analyzes the disclosure submitted to Microsoft and available in English on digitaldefense , where images, demonstration videos and a Python code example are available. In recent years, digital...

Calendar Subscriptions: A Hidden Danger in Your Digital Life

Digital calendars have long been a convenient way to keep track of daily activities, but new research from Bitsight shows that this familiar tool can become a real attack channel....

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE