Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Fortinet 320x100px
UtiliaCS 970x120

Red Hot Cyber – News and insights on cybercrime and cybersecurity

Precedente Successivo

Ultime news

Critical MongoDB Vulnerability Exposed: CVE-2025-14847 Cyber News

Critical MongoDB Vulnerability Exposed: CVE-2025-14847

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security...
Redazione RHC - 23 December 2025
Smart TV Spying: Major Brands Accused of Collecting User Data Cyber News

Smart TV Spying: Major Brands Accused of Collecting User Data

Texas Attorney General Ken Paxton has charged five major television manufacturers with illegally collecting user data using automatic content recognition...
Redazione RHC - 23 December 2025
Phishing Campaigns Exploit File Sharing Services Cyber News

Phishing Campaigns Exploit File Sharing Services

Researchers at Check Point, a pioneer and global leader in cybersecurity solutions, have discovered a phishing campaign in which attackers...
Redazione RHC - 23 December 2025
RansomHouse Ransomware Upgraded: Enhanced Encryption Threat Cyber News

RansomHouse Ransomware Upgraded: Enhanced Encryption Threat

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks....
Redazione RHC - 22 December 2025
Cyber Attacks on the Rise: Wiper Malware and Data Destruction in 2025 Cyber News

Cyber Attacks on the Rise: Wiper Malware and Data Destruction in 2025

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This...
Redazione RHC - 22 December 2025
MS13-089 Ransomware: Double Extortion Without Encryption Cybercrime

MS13-089 Ransomware: Double Extortion Without Encryption

MS13-089 opens a leak site on the dark web, exposes the first data and adopts a double extortion strategy without...
Inva Malaj - 22 December 2025

Microsoft Fixes Old Windows LNK Vulnerability Exploited in Attacks

Microsoft has quietly patched a long-standing Windows vulnerability that has been exploited in real-world attacks for several years. The update was released on November's Patch Tuesday, despite the company having...

Critical React Server Vulnerability: Update Now to Prevent RCE Attacks

Developers and administrators around the world are urgently updating their servers following the discovery of a critical vulnerability in React Server, which allows attackers to remotely execute unauthenticated code with...

Critical Vulnerability in King Addons for Elementor Exploited

During the registration process, a critical security flaw (CVE-2025-8489) in the King Addons WordPress Elementor plugin was exploited by attackers, allowing them to gain administrative privileges via a privilege escalation...

Google Discover AI Headlines: Revolutionizing News Feed or Clickbait Nightmare?

Google is testing AI-generated headlines in its Discover feed, replacing original news headlines with original ones. Sean Hollister, editor-in-chief of The Verge, reported this , noting that short and often...

Storm-0900 Phishing Campaign Spreads XWorm Malware

Over the holiday season, a coordinated attack was detected and blocked by Microsoft Threat Intelligence security analysts, involving tens of thousands of emails crafted to deceive recipients. The cybercriminal group...

Windows 10 Still Running on 1 Billion PCs, Upgrade to Windows 11 Urged

Windows 10 has been officially retired, but it still runs on approximately one billion personal computers worldwide. A significant number of devices are technically ready to upgrade to Windows 11,...

Secure AI Integration in OT Systems: Key Principles and Best Practices

Since ChatGPT's public release in November 2022, artificial intelligence (AI) has been integrated into many aspects of human society. For owners and operators of critical infrastructure, AI can be used...

Aisuru Botnet Unleashes 29.7 Tbps DDoS Attack, Cloudflare Mitigates

A botnet service called Aisuru offers an army of compromised IoT devices and routers to launch high-traffic DDoS attacks. In just three months, the massive Aisuru botnet launched more than...

Critical Vulnerability in Iskra iHUB Devices Exposed

A serious security vulnerability has been discovered in smart metering infrastructure, which could expose utility networks to remote takeover risks. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued...

Roblox Down Russia

Today, the Roblox gaming platform went offline in Russia. However, international services that monitor network outages reported no issues during the same period. The main complaints concerned the inability to...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
A blow to the heart of cybercrime: RAMP taken offline. The “temple” of ransomware falls!
Bajram Zeqiri - 28/01/2026

The RAMP (Russian Anonymous Marketplace) forum, one of the main hubs of the international cybercrime underground, has been officially shut down and seized by US law enforcement . The news emerged after the domain associated…

Immagine del sitoCyberpolitics
Digital Autonomy: France Says Goodbye to Teams and Zoom by 2027
Silvia Felici - 28/01/2026

This isn’t the first initiative to emerge on this front recently. Indeed, we’ve heard several of them, one after the other. And it’s almost inevitable: technological autonomy and national security are becoming an increasingly popular…

Immagine del sitoCyber News
And let the phishing begin! Microsoft is taking action against a zero-day exploit already exploited in Office
Pietro Melillo - 27/01/2026

Once again, Microsoft was forced to quickly fix some flaws. The company has released unscheduled patches for Microsoft Office, addressing a dangerous zero-day vulnerability that has already been exploited in cyberattacks. The issue, identified as…

Immagine del sitoCyber News
ServiceNow Under Attack: How an Email Can Open the Doors to Your Business
Redazione RHC - 27/01/2026

The recent discovery of a vulnerability in ServiceNow’s AI platform has shaken the cybersecurity industry. This flaw, characterized by an extremely high severity score, allowed unauthenticated attackers to impersonate any corporate user. To launch the…

Immagine del sitoCybercrime
149 Million Accounts Exposed: The Database No One Should Have Seen
Redazione RHC - 26/01/2026

A recent leak revealed 149 million logins and passwords exposed online , including accounts for financial services, social media, gaming, and dating sites. The discovery was made by researcher Jeremiah Fowler and shared with ExpressVPN.…