Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Banner Desktop
Precedente Successivo

Latest news

ShadyPanda Malware Infects 4.3M Browsers with Chrome Edge Extensions Cyber News

ShadyPanda Malware Infects 4.3M Browsers with Chrome Edge Extensions

Researchers at Koi Security described a multi-stage operation called ShadyPanda . Over the course of seven years, attackers released seemingly...
Massimiliano Brolli - December 2, 2025
The Dark Side of Internet Control: Durov’s Warning Cybercrime

The Dark Side of Internet Control: Durov’s Warning

Post 462 on Durov's official channel immediately went into “scream mode”: “ The end of the free internet. The free...
Sandro Sana - December 2, 2025
Brazilian Systems Targeted in Sophisticated OAST Exploit Campaign Cyber News

Brazilian Systems Targeted in Sophisticated OAST Exploit Campaign

Security researchers have discovered a sophisticated exploit campaign that leverages a private out-of-band application security testing (OAST) service hosted on...
Redazione RHC - December 1, 2025
Australian Man Jailed for Evil Twin Wi-Fi Scam Targeting Airline Passengers Cyber News

Australian Man Jailed for Evil Twin Wi-Fi Scam Targeting Airline Passengers

An Australian court has convicted a 44-year-old man who stole the personal data of airline passengers and airport visitors over...
Redazione RHC - December 1, 2025
KrakenBite Phishing Service Exposed Cyber News

KrakenBite Phishing Service Exposed

The underground cybercrime market continues to evolve rapidly, fueled by specialized groups designing and selling tools for increasingly sophisticated digital...
Redazione RHC - December 1, 2025
ADC Aerospace Hit by Play Ransomware Attack, Data Breach Feared Cyber News

ADC Aerospace Hit by Play Ransomware Attack, Data Breach Feared

American aviation and defense components manufacturer ADC Aerospace has found itself in the spotlight due to a possible cyber attack...
Redazione RHC - December 1, 2025

Port scanning in 2025: Nmap and AI — how to integrate them securely and operationally

In 2025, port scanning remains a key activity for both Red Teams (reconnaissance, discovery, fingerprinting) and Blue Teams (monitoring and proactive defense). But the latest development is the arrival of...

The Louvre Theft: When Thieves Taught the World the Physical Pen Test

The event that shook the world on October 19, 2025, was not a natural disaster or a financial collapse, but the sensational theft of Napoleon's jewels from the Louvre Museum....

Starting November 12th, age verification for porn sites will be implemented in Italy. What’s changing?

Starting Tuesday, November 12, 2025, new provisions from the Italian Communications Regulatory Authority (AGCOM) will come into force, requiring an age verification system for accessing pornographic websites. The measure, provided...

AzureHound: The “Legitimate” Tool for Cloud Attacks

AzureHound, part of the BloodHound suite, was born as an open-source tool to help security teams and red teams identify vulnerabilities and escalation paths in Microsoft Azure and Entra ID...

Red Hot Cyber launches free real-time CVE Enrichment service

Timeliness is key in cybersecurity. Red Hot Cyber recently launched a completely free service that allows IT professionals, security analysts, and enthusiasts to monitor the most critical vulnerabilities published in...

Going 50 Years Without Charging Your Phone: Here’s the Chinese Battery That Will Change Everything

Beijing-based Betavolt claims to have developed a nuclear battery that represents the world's first achievement in the miniaturization of atomic energy. This innovation involves integrating 63 nuclear isotopes into a...

Mossad, the rigged supply chain, and intimidated judges

Yossi Cohen, former director of the Mossad, has said publicly two things that usually remain locked away in a room without tape recorders. First, Israel allegedly deployed a global sabotage...

Nvidia invests $1 billion in Nokia to develop 6G networks with AI

Jen-Hsun Huang dropped a bombshell: Nvidia has reportedly invested $1 billion in Nokia. Yes, Nokia is the company that made Symbian phones so popular 20 years ago. In his speech,...

Linux and gaming: an increasingly reliable combination

According to Boiling Steam , the number of Windows games running reliably on Linux is the highest ever recorded. The analysis is based on statistics from ProtonDB , which collects...

Russian Interior Ministry officials arrested the creators of the Medusa malware

The Russian programming team behind the Medusa malware has been arrested by officials from the Russian Interior Ministry, with the support of police in the Astrakhan region. According to investigators,...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE