Welcome to Red Hot Cyber | Cybersecurity News
Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
TM RedHotCyber 320x100 042514
Crowdstriker 970×120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
WiFi Network Security: Protect Against Hacking with WPA3 and ARP Spoofing
Di Francesco Demarcus - 02/12/2025

In today’s environment, securing a network requires much more than setting a complex password. A cyber attack against a wireless network follows a structured path that evolves from passive monitorin...

Immagine del sito
The Dark Side of Internet Control: Durov’s Warning
Di Sandro Sana - 02/12/2025

Post 462 on Durov’s official channel immediately went into “scream mode”: “ The end of the free internet. The free internet is becoming a tool of control .” No birthday wishes. Durov explain...

Immagine del sito
Brazilian Systems Targeted in Sophisticated OAST Exploit Campaign
Di Redazione RHC - 01/12/2025

Security researchers have discovered a sophisticated exploit campaign that leverages a private out-of-band application security testing (OAST) service hosted on Google Cloud infrastructure. The campai...

Immagine del sito
KrakenBite Phishing Service Exposed
Di Redazione RHC - 01/12/2025

The underground cybercrime market continues to evolve rapidly, fueled by specialized groups designing and selling tools for increasingly sophisticated digital scams. Among these, a particularly active...

Immagine del sito
ADC Aerospace Hit by Play Ransomware Attack, Data Breach Feared
Di Redazione RHC - 01/12/2025

American aviation and defense components manufacturer ADC Aerospace has found itself in the spotlight due to a possible cyber attack by the Play ransomware group, which appeared on their blog where cr...

Louvre Theft: Windows 2000 and Windows XP on Networks, as Well as Simple Passwords

As we know, the thieves in the "theft of the century" entered through a second-floor window of the Louvre Museum, but the museum had other problems be...
Redazione RHC - 04/11/2025 - 19:05

SesameOp: The Malware That Uses OpenAI Assistants for Command and Control

Microsoft has discovered a new malware, dubbed SesameOp , and published details of how it works . This backdoor was unusual: its creators used the Ope...
Redazione RHC - 04/11/2025 - 18:39

Chinese hackers target European diplomatic agencies (including Italy)

The China-linked hacker group UNC6384 ( also known as Mustang Panda ) is conducting a large-scale cyberespionage campaign targeting European diplomati...
Redazione RHC - 04/11/2025 - 15:27

Eight 0-days worth $35 million sold to Russia by US insiders

Former US defense contractor CEO Peter Williams has pleaded guilty to selling " eight sensitive, protected cyber exploits" to Russian zero-day broker ...
Redazione RHC - 04/11/2025 - 11:19

Trump refuses to export Nvidia chips. China responds: “Don’t worry, we’ll do it ourselves.”

Reuters reported that Trump told reporters during a pre-recorded interview on CBS's "60 Minutes" and on Air Force One during the return flight: "We're...
Redazione RHC - 04/11/2025 - 07:41

Goodbye, malware! In 2025, criminal hackers will use legitimate accounts to remain invisible.

A FortiGuard report for the first half of 2025 shows that financially motivated attackers are increasingly eschewing sophisticated exploits and malwar...
Redazione RHC - 04/11/2025 - 07:22
1 43 44 45 46 47 262

Louvre Theft: Windows 2000 and Windows XP on Networks, as Well as Simple Passwords

- November 3rd, 2025

As we know, the thieves in the "theft of the century" entered through a second-floor window of the Louvre Museum, but the museum had other problems besides unprotected windows. Although...

Facebook Linkedin X

SesameOp: The Malware That Uses OpenAI Assistants for Command and Control

- November 3rd, 2025

Microsoft has discovered a new malware, dubbed SesameOp , and published details of how it works . This backdoor was unusual: its creators used the OpenAI Assistants API as a...

Facebook Linkedin X

Chinese hackers target European diplomatic agencies (including Italy)

- November 3rd, 2025

The China-linked hacker group UNC6384 ( also known as Mustang Panda ) is conducting a large-scale cyberespionage campaign targeting European diplomatic and government agencies. According to Arctic Wolf and StrikeReady...

Facebook Linkedin X

Eight 0-days worth $35 million sold to Russia by US insiders

- November 3rd, 2025

Former US defense contractor CEO Peter Williams has pleaded guilty to selling " eight sensitive, protected cyber exploits" to Russian zero-day broker Operation Zero. Court documents and a TechCrunch investigation...

Facebook Linkedin X

Trump refuses to export Nvidia chips. China responds: “Don’t worry, we’ll do it ourselves.”

- November 3rd, 2025

Reuters reported that Trump told reporters during a pre-recorded interview on CBS's "60 Minutes" and on Air Force One during the return flight: "We're not going to let any country...

Facebook Linkedin X

Goodbye, malware! In 2025, criminal hackers will use legitimate accounts to remain invisible.

- November 3rd, 2025

A FortiGuard report for the first half of 2025 shows that financially motivated attackers are increasingly eschewing sophisticated exploits and malware. Instead , they are using valid accounts and legitimate...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE