Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Enterprise BusinessLog 320x200 1
Cyber Offensive Fundamentals 970x120 V0.1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

The Birth of World Wide Web: How Tim Berners-Lee Created the First Website Cyber News

The Birth of World Wide Web: How Tim Berners-Lee Created the First Website

There you have it! On December 20, 1990, something epochal happened at CERN in Geneva. Tim Berners-Lee , a British...
Silvia Felici - 20 December 2025
WatchGuard Firewall Zero-Day Vulnerability CVE-2025-14733 Exploited Cyber News

WatchGuard Firewall Zero-Day Vulnerability CVE-2025-14733 Exploited

A critical zero-day vulnerability, identified as CVE-2025-14733, has left network administrators on their knees, forcing them into a race against...
Redazione RHC - 19 December 2025
Linux Kernel CVE-2025-68260 Vulnerability Fixed: Rust Code at Risk Cyber News

Linux Kernel CVE-2025-68260 Vulnerability Fixed: Rust Code at Risk

The world of technology is a veritable battlefield, where coding geniuses challenge malicious attackers every day with exploits and security...
Silvia Felici - 19 December 2025
Google and Apple Embrace Interoperability with Android iOS Data Transfer Cyber News

Google and Apple Embrace Interoperability with Android iOS Data Transfer

Users looking to switch from an iOS to Android ecosystem or vice versa often face less of a challenge than...
Redazione RHC - 19 December 2025
Ink Dragon Targets Europe: Exploiting SharePoint and IIS Vulnerabilities Cyber crime

Ink Dragon Targets Europe: Exploiting SharePoint and IIS Vulnerabilities

This news comes to us from Recorded Future (Insikt Group) News & Research feed: Check Point Research has documented a...
Sandro Sana - 19 December 2025
Bypassing AI Safety: EchoGram Exposes Vulnerabilities in LLM Defenses Cyber News

Bypassing AI Safety: EchoGram Exposes Vulnerabilities in LLM Defenses

Large language models are typically released with security constraints : separate AIs from the main LLM ensure that malicious suggestions...
Redazione RHC - 19 December 2025

Digital Crime Among Teenagers: Temporary Involvement

Dutch authorities have published data showing that adolescents' involvement in cybercrime is usually temporary. An analysis prepared by the House of Representatives indicates that early interest in hacking often fades...

Porsche Russia Alarm Issues Spark Widespread Vehicle Immobilization

Porsche owners in Russia are increasingly experiencing problems with factory alarms, making it impossible to use their cars. Their cars won't start, stall immediately after starting, or display engine-related errors...

Cryptomixer Shut Down: Europol Cracks Down on $1.3B Bitcoin Mixing Service

Law enforcement agencies in Switzerland and Germany have reported the dismantling of Cryptomixer , a major mixing service operating since 2016 that helped criminals launder illicitly obtained funds. According to...

888 Data Leaker: Ryanair Breach Exposed

In the underground forum landscape, there are actors who operate episodically, seeking a single media hit, and others who build an almost industrial pipeline of compromises over time, releasing technical...

WiFi Network Security: Protect Against Hacking with WPA3 and ARP Spoofing

In today's environment, securing a network requires much more than setting a complex password. A cyber attack against a wireless network follows a structured path that evolves from passive monitoring...

ShadyPanda Malware Infects 4.3M Browsers with Chrome Edge Extensions

Researchers at Koi Security described a multi-stage operation called ShadyPanda . Over the course of seven years, attackers released seemingly useful extensions for Chrome and Edge, built up an audience...

The Dark Side of Internet Control: Durov’s Warning

Post 462 on Durov's official channel immediately went into “scream mode”: “ The end of the free internet. The free internet is becoming a tool of control .” No birthday...

Phishing Attacks Surge in Black Friday Season: Stay Vigilant

This year, too, cybercriminals are taking advantage of seasonal shopping periods to spread phishing websites and fraudulent promotions, aiming to steal personal information and payment details . Gaming platforms remain...

Human Washing Machine Launched: Japan’s Science Unveils Unique Device

Japanese company Science has launched a washing machine for humans. The 2.30-meter-long capsule bathes a person in 15 minutes and attracted considerable interest at the recently concluded Osaka Expo. The...

Brazilian Systems Targeted in Sophisticated OAST Exploit Campaign

Security researchers have discovered a sophisticated exploit campaign that leverages a private out-of-band application security testing (OAST) service hosted on Google Cloud infrastructure. The campaign primarily targets systems in Brazil...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCyber News
When Malware Hides in Videos! The PixelCode Technique Breaks the Rules
Redazione RHC - 26/01/2026

PixelCode began as a research project exploring a hidden technique for storing binary data within images or videos . Instead of leaving a plaintext executable, the file is converted into pixel data, transforming each byte…

Immagine del sitoCyber News
How a simple Visual Studio Code file can become a backdoor for state-run hackers
Redazione RHC - 26/01/2026

Security researchers have recently observed a worrying evolution in the offensive tactics attributed to North Korean-linked actors as part of the campaign known as Contagious Interview : no longer simple fake job interview scams, but…

Immagine del sitoCyber News
Khaby Lame is selling the rights to his digital identity for $900 million. But there’s reason to think.
Redazione RHC - 26/01/2026

Khaby Lame, the world’s most followed Italian creator and now a global social media icon, has taken a step that could mark a turning point in the history of the digital economy. According to several…

Immagine del sitoCyber News
CISA alert: Exploit underway against VMware vCenter. Risk of RCE without authentication.
Redazione RHC - 25/01/2026

The critical vulnerability recently added to the Cybersecurity and Infrastructure Security Agency (CISA) catalog of known exploited vulnerabilities (KEVs) affects the Broadcom VMware vCenter Server and is being actively exploited by malicious hackers to breach…

Immagine del sitoCyber News
“I Stole 120,000 Bitcoins”: The Confession of the Bitfinex Hacker Who Now Wants to Defend Cyberspace
Agostino Pellegrino - 25/01/2026

The story ofIlya Lichtenstein, the hacker responsible for one of the largest cyber attacks ever carried out against cryptocurrencies, reads like an episode of a TV series, yet it is absolutely real. After being released,…