Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Heliaca 970x120 1
Precedente Successivo

Latest news

Disney Invests $1 Billion in OpenAI for Sora Video Deal Cyber News

Disney Invests $1 Billion in OpenAI for Sora Video Deal

Disney will invest $1 billion in OpenAI and officially license its characters for use in its Sora video generator. The...
Silvia Felici - December 12, 2025
React Server Components Vulnerability: Update to Prevent DoS Attacks Vulnerability

React Server Components Vulnerability: Update to Prevent DoS Attacks

The React Server component security saga continues this week. Following the patching of a critical remote code execution (RCE) vulnerability...
Agostino Pellegrino - December 12, 2025
Critical Windows PowerShell Vulnerability CVE-2025-54100: Update Now Vulnerability

Critical Windows PowerShell Vulnerability CVE-2025-54100: Update Now

An urgent security update has been released to address a critical vulnerability in Windows PowerShell that allows attackers to execute...
Agostino Pellegrino - December 12, 2025
Notepad++ Vulnerability Fixed: Update to 8.8.9 to Avoid Malware Cyber News

Notepad++ Vulnerability Fixed: Update to 8.8.9 to Avoid Malware

Notepad++ is often targeted by attackers because the software is popular and widely used. A recently discovered vulnerability in the...
Redazione RHC - December 11, 2025
Digital Stress: How to Achieve Balance in a Hyper-Connected World Cybercrime

Digital Stress: How to Achieve Balance in a Hyper-Connected World

We live in dissociation: we praise work-life balance, yet we find ourselves constantly online, like puppets on invisible strings. The...
Daniela Farina - December 11, 2025
Uncovering Russia’s Cyber Operations: CISM’s Role in DDoS Attacks Cyber News

Uncovering Russia’s Cyber Operations: CISM’s Role in DDoS Attacks

What we wrote in the article " Patriotic Code: from DDoSia and NoName057(16) to CISM, the algorithm that shapes youth...
Marcello Filacchioni - December 11, 2025

The AI market is in crisis: NVIDIA and other tech giants are declining.

Artificial intelligence has been the biggest trend in recent years, as the stock prices of AI-related tech giants have skyrocketed. NVIDIA has surpassed the $5 trillion market cap, becoming a...

A bug in ImunifyAV antivirus leads to RCE. 56 million sites at risk.

A vulnerability has been discovered in the Linux hosting ecosystem : the ImunifyAV malware scanner has been found to be vulnerable to remote code execution (RCE). The issue affects the...

Discovering Remote Code Execution (RCE). The most feared security bug!

Of all the vulnerabilities, the most feared by victims and the most sought after by attackers is remote code execution, or RCE. This vulnerability allows arbitrary commands to be executed...

An “autonomous” spy campaign was orchestrated by artificial intelligence

An analysis conducted in recent months had highlighted how the evolution of artificial intelligence systems was reaching a critical point for cybersecurity, with capabilities doubling in just six months ....

What is Misevolution: The Autonomous Evolution of AI Agents, and It’s Not Always Good

Shanghai, November 11, 2025 – A new study conducted by the Shanghai Artificial Intelligence Laboratory , in collaboration with Shanghai Jiao Tong University , Renmin University of China , and...

Tanks are no longer needed: new wars are fought from a laptop

Author: Roberto Villani, Tanslate: Vincenzo Marcovecchio Why will the cyberg wars, indeed the cyber-guerrillas, be more and more present and involve us more and more? The short century, the 1900s...

A 0Day bug for a WordPress plugin sold for 6000 euros in the underground

On one of Russia's most popular forums for buying and selling vulnerabilities and attack tools, the thread appeared as a standard commercial ad, but the content is anything but trivial....

Triofox Antivirus Exploited to Install Remote Access Components

Google researchers warn that hackers are exploiting a critical vulnerability in Gladinet Triofox to remotely execute code with SYSTEM privileges, bypassing authentication and gaining complete control of the system. The...

Two 0-day attacks, one attack: the perfect strike against Citrix and Cisco. Amazon’s discovery

Amazon ha segnalato un complesso attacco informatico in cui gli aggressori hanno sfruttato simultaneamente due vulnerabilità zero-day, presenti nei prodotti Citrix e Cisco. Secondo il responsabile della sicurezza informatica dell'azienda,...

The Queen of Cryptocurrency Has Been Captured! She Stole $7 Billion in Bitcoin

A London court has sentenced 47-year-old Chinese woman Zhimin Qian , also known as Yadi Zhang, to 11 years and eight months in prison for laundering bitcoin obtained through the...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE