Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

LECS 970x120 1

Latest news

NightshadeC2, the new botnet that uses unconventional methods to bypass protection Cyber News

NightshadeC2, the new botnet that uses unconventional methods to bypass protection

eSentire has reported the discovery of a new botnet called NightshadeC2, which uses unconventional methods to bypass protection and sandboxes....
Sandro Sana - September 9, 2025
WhatsApp and Apple in emergency: DNG bug allows remote control without clicking Cyber News

WhatsApp and Apple in emergency: DNG bug allows remote control without clicking

On August 20, Apple released an unscheduled security update for all major operating systems: iOS, iPadOS, macOS, and other platforms....
Agostino Pellegrino - September 8, 2025
Stealerium and Phantom: How Open-Source Infostealers Are Taking the World by storm Cyber News

Stealerium and Phantom: How Open-Source Infostealers Are Taking the World by storm

Researchers at Proofpoint, a leader in cybersecurity and information protection, have detected a worrying increase in the use of open-source...
Sandro Sana - September 8, 2025
Apple launches Security Research Device 2026 program for security researchers Cyber News

Apple launches Security Research Device 2026 program for security researchers

Apple has announced that it will accept applications for the Security Research Device Program (SRDP) 2026. Bug hunters interested in...
Redazione RHC - September 8, 2025
Salesloft Drift Incident Expands: Tenable Confirms Customer Data Breach Cyber News

Salesloft Drift Incident Expands: Tenable Confirms Customer Data Breach

Tenable also suffered a compromise of contact information and support case details for some customers. The company said the incident...
Redazione RHC - September 8, 2025
9.9 out of 10! All SAP S/4HANA systems at risk: Patch now! Cyber News

9.9 out of 10! All SAP S/4HANA systems at risk: Patch now!

A critical vulnerability, CVE-2025-42957, has been identified in SAP S/4HANA, which has received a CVSS score of 9.9. The flaw...
Bajram Zeqiri - September 8, 2025
AI needs a shrink! It can be fooled like humans. Cyber News

AI needs a shrink! It can be fooled like humans.

Entrepreneur Dan Shapiro ran into an unexpected problem: a popular AI-powered chatbot refused to decrypt company documents, citing copyright infringement....
Redazione RHC - September 8, 2025
Telegram as a Command & Control Platform for Criminal Activities and the Role of Threat Intelligence Cyber News

Telegram as a Command & Control Platform for Criminal Activities and the Role of Threat Intelligence

In today's cybersecurity landscape, one of the most worrying trends is the abuse of legitimate messaging platforms for malicious purposes....
Marcello Filacchioni - September 8, 2025
Houthi threat or mysterious incident? The Red Sea paralyzes Asia and the Middle East. Cyber News

Houthi threat or mysterious incident? The Red Sea paralyzes Asia and the Middle East.

As we reported this morning, several undersea cables in the Red Sea have been severed, causing internet access delays and...
Sandro Sana - September 7, 2025
Toha Arrest: The Future of the Black Market After XSS Shuts Down Cybercrime

Toha Arrest: The Future of the Black Market After XSS Shuts Down

The arrest of the alleged administrator of the Russian-language forum XSS[.]is, nicknamed Toha, has become a turning point for the...
Pietro Melillo - September 7, 2025
Digital blackout: Broken undersea cables in the Red Sea slow down Microsoft’s cloud. Cyber News

Digital blackout: Broken undersea cables in the Red Sea slow down Microsoft’s cloud.

On Saturday, Microsoft reported issues with its Azure cloud platform due to the breakage of several international undersea cables in...
Redazione RHC - September 7, 2025
Geoffrey Hinton’s shocking revelations: Better to trust China than Zuckerberg! Cyber News

Geoffrey Hinton’s shocking revelations: Better to trust China than Zuckerberg!

Geoffrey Hinton, known as the "godfather of artificial intelligence," recently shared his thoughts in a panel with the Financial Times....
Silvia Felici - September 6, 2025

Android Malware Steals NFC-Enabled Credit Cards

In Eastern European countries, there has been a rapid increase in malicious Android apps that exploit contactless data transfer technology to steal credit cards. According to Zimperium, over 760 programs...

Le Security Operations al tempo dell’Artificial Intelligence

By Vicki Vinci, SOC Architect - International at Fortinet The most significant technological trend of recent years is undoubtedly the advent of Artificial Intelligence, especially its generative component (GenAI). Putting...

The race for cybersecurity has begun and Italy is running with its shoes tied

In recent years, cybersecurity has risen to the top of the agendas of businesses, institutions, and public administration. But if we look at the numbers, Italy still seems to be...

Port scanning in 2025: Nmap and AI — how to integrate them securely and operationally

In 2025, port scanning remains a key activity for both Red Teams (reconnaissance, discovery, fingerprinting) and Blue Teams (monitoring and proactive defense). But the latest development is the arrival of...

The Louvre Theft: When Thieves Taught the World the Physical Pen Test

The event that shook the world on October 19, 2025, was not a natural disaster or a financial collapse, but the sensational theft of Napoleon's jewels from the Louvre Museum....

Starting November 12th, age verification for porn sites will be implemented in Italy. What’s changing?

Starting Tuesday, November 12, 2025, new provisions from the Italian Communications Regulatory Authority (AGCOM) will come into force, requiring an age verification system for accessing pornographic websites. The measure, provided...

AzureHound: The “Legitimate” Tool for Cloud Attacks

AzureHound, part of the BloodHound suite, was born as an open-source tool to help security teams and red teams identify vulnerabilities and escalation paths in Microsoft Azure and Entra ID...

Red Hot Cyber launches free real-time CVE Enrichment service

Timeliness is key in cybersecurity. Red Hot Cyber recently launched a completely free service that allows IT professionals, security analysts, and enthusiasts to monitor the most critical vulnerabilities published in...

Going 50 Years Without Charging Your Phone: Here’s the Chinese Battery That Will Change Everything

Beijing-based Betavolt claims to have developed a nuclear battery that represents the world's first achievement in the miniaturization of atomic energy. This innovation involves integrating 63 nuclear isotopes into a...

Mossad, the rigged supply chain, and intimidated judges

Yossi Cohen, former director of the Mossad, has said publicly two things that usually remain locked away in a room without tape recorders. First, Israel allegedly deployed a global sabotage...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE