Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Heliaca 970x120 1

Red Hot Cyber – News and insights on cybercrime and cybersecurity

Precedente Successivo

Latest news

The Birth of World Wide Web: How Tim Berners-Lee Created the First Website Cyber News

The Birth of World Wide Web: How Tim Berners-Lee Created the First Website

There you have it! On December 20, 1990, something epochal happened at CERN in Geneva. Tim Berners-Lee , a British...
Silvia Felici - December 20, 2025
WatchGuard Firewall Zero-Day Vulnerability CVE-2025-14733 Exploited Cyber News

WatchGuard Firewall Zero-Day Vulnerability CVE-2025-14733 Exploited

A critical zero-day vulnerability, identified as CVE-2025-14733, has left network administrators on their knees, forcing them into a race against...
Pietro Melillo - December 19, 2025
Linux Kernel CVE-2025-68260 Vulnerability Fixed: Rust Code at Risk Cyber News

Linux Kernel CVE-2025-68260 Vulnerability Fixed: Rust Code at Risk

The world of technology is a veritable battlefield, where coding geniuses challenge malicious attackers every day with exploits and security...
Silvia Felici - December 19, 2025
Google and Apple Embrace Interoperability with Android iOS Data Transfer Cyber News

Google and Apple Embrace Interoperability with Android iOS Data Transfer

Users looking to switch from an iOS to Android ecosystem or vice versa often face less of a challenge than...
Redazione RHC - December 19, 2025
Ink Dragon Targets Europe: Exploiting SharePoint and IIS Vulnerabilities Cybercrime

Ink Dragon Targets Europe: Exploiting SharePoint and IIS Vulnerabilities

This news comes to us from Recorded Future (Insikt Group) News & Research feed: Check Point Research has documented a...
Sandro Sana - December 19, 2025
Bypassing AI Safety: EchoGram Exposes Vulnerabilities in LLM Defenses Cyber News

Bypassing AI Safety: EchoGram Exposes Vulnerabilities in LLM Defenses

Large language models are typically released with security constraints : separate AIs from the main LLM ensure that malicious suggestions...
Redazione RHC - December 19, 2025

ChatGPT to Introduce Targeted Ads, Changing Monetization Strategy

Until now, ChatGPT has been ad-free: no banners, no hidden promotions. Even the paid versions worked without pushy offers. But that could change soon. As reported by user X (formerly...

GitLab Security Updates Fix High-Severity Vulnerabilities CVE-2024-9183

GitLab has released critical security updates for its Community Edition (CE) and Enterprise Edition (EE) to address several high-severity vulnerabilities . The newly released patches 18.6.1, 18.5.3, and 18.4.5 address...

Apache SkyWalking Vulnerability Exposes Users to XSS Attacks

A vulnerability was recently discovered in Apache SkyWalking , a popular application performance monitoring tool, that attackers could exploit to execute malicious scripts and launch cross-site scripting (XSS) attacks ....

Bloody Wolf Attacks Central Asia with NetSupport RAT via Java Exploits

Group-IB specialists have recorded new attacks by the Bloody Wolf hacker group, which has been targeting Kyrgyzstan since June 2025 and has expanded its operations to Uzbekistan since October. The...

WhatsApp Blocked in Russia: Messaging App Faces Crackdown

The Russian Federation's Roskomnadzor has announced that it continues to impose systematic restrictions on the messaging app WhatsApp due to violations of Russian law. According to the agency, the service...

CEO Scam: How to Protect Your Company from Business Email Compromise

This morning, Paragon Sec was contacted by an Italian company that had been the victim of a new fraud attempt known as the CEO Scam . The accounting department received...

Shai-Hulud Worm Spreads Beyond npm, Attacks Maven

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used...

11.7% of jobs could be replaced by artificial intelligence

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable...

The market for “controlling” people is taking off on the Dark Web.

BI.ZONE experts analyzed over 3,500 advertisements on darknet platforms offering dossiers on specific individuals, known as "probiv" (finding). One in five offers (21%) promises a complete profile of an individual....

God is in the Cloud: They Hacked Your Brain and You Liked It

We're in the age of paid deception. Your every click is a private referendum in which they, the algorithms, always win. And they're never wrong: they observe you, profile you,...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE