Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Fortinet 970x120px

Red Hot Cyber – News and insights on cybercrime and cybersecurity

Precedente Successivo

Ultime news

How Profanity Varies Across Social Media and Cultures Cyber News

How Profanity Varies Across Social Media and Cultures

Americans are the most likely to swear on social media, but Australians are more creative in their use of the...
Redazione RHC - 15 December 2025
GhostFrame Phishing Kit: New Stealthy PhaaS Threat Emerges Cyber News

GhostFrame Phishing Kit: New Stealthy PhaaS Threat Emerges

Barracuda has released details of a new stealthy, evasive phishing-as-a-service (PhaaS) kit that hides malicious content within web page iframes...
Silvia Felici - 14 December 2025
WhatsApp: all it takes is a phone number to know when you sleep, go out, or come home Cyber News

WhatsApp: all it takes is a phone number to know when you sleep, go out, or come home

A tool has been released that allows for the discreet monitoring of WhatsApp and Signal user activity using just a...
Redazione RHC - 14 December 2025
Cyber Geopolitics: How Tech Becomes a Global Battleground Cybercrime

Cyber Geopolitics: How Tech Becomes a Global Battleground

Over the past two years, cyber has ceased to be a " technical " dimension of the conflict and has...
Roberto Villani - 14 December 2025
SOAP Vulnerability in .NET Framework Allows Remote Code Execution Vulnerability

SOAP Vulnerability in .NET Framework Allows Remote Code Execution

Security researchers have discovered a vulnerability in .NET that could affect several enterprise products and lead to remote code execution....
Agostino Pellegrino - 14 December 2025
CVE-2025-55182 React Server Components Vulnerability Exploited Cyber News

CVE-2025-55182 React Server Components Vulnerability Exploited

A recent report from the Google Threat Intelligence Group (GTIG) illustrates the chaotic results of this information dissemination, highlighting how...
Marcello Filacchioni - 13 December 2025

Whoever took down Cloudflare during the outage put their infrastructure at risk

A major outage in Cloudflare's infrastructure has unexpectedly tested the robustness of the cloud and its security systems for many businesses. On November 18, service outages caused websites around the...

Critical Vulnerability in Azure Bastion Scores 10! When RDP and SSH in the Cloud Are Checkmated

An authentication bypass vulnerability has been discovered in Azure Bastion , Microsoft's managed service that enables secure RDP and SSH connections to virtual machines in Azure without directly exposing them...

Risk averted for millions of Microsoft users! The critical vulnerability in Microsoft SharePoint 9.8

Microsoft has disclosed a critical vulnerability in SharePoint Online (discovered by RHC through our ongoing monitoring of critical CVEs on our portal), identified as CVE‑2025‑59245 , with a CVSS v3.1...

Sturnus, the banking Trojan that intercepts WhatsApp, Telegram, and Signal messages

ThreatFabric specialists have discovered a new banking Trojan, Sturnus . The malware is capable of intercepting messages from end-to-end encrypted messaging apps (Signal, WhatsApp, Telegram) and gaining full control over...

Disloyal Employees: Fired, Returns to Work, and Resets 2,500 Passwords Without the Company’s Knowledge

An employee has pleaded guilty to hacking into his former employer's network and causing nearly $1 million in damages after being fired. According to the indictment, 35-year-old Maxwell Schultz, who...

MONOLOCK: The new “silent” ransomware group that rejects leak sites and affiliate panels.

The ransomware landscape is changing. The most exposed actors—LockBit, Hunters International, and Trigona—have paid the price for overexposure, including international operations, infiltrations, deliberate leaks, and operational collapses. After years dominated...

Critical vulnerability in the WordPress plugin W3 Total Cache. 430,000 sites at risk!

A critical vulnerability, CVE-2025-9501, has been discovered in the popular WordPress plugin W3 Total Cache . This vulnerability allows the execution of arbitrary PHP commands on the server without authentication....

Hundreds of robots on the march: China presents the new generation of humanoids

Shenzhen -based UBTECH Robotics has publicly demonstrated its new wave of humanoid robots, delivering several hundred of them in a single shipment. The announcement was accompanied by a video that...

Veeam launches Data Platform v13, redefining the standard for cyber resilience and advanced data protection.

With new capabilities to stay ahead of threats and accelerate recovery with next-generation security, forensic insights and intelligent automation, Veeam also launches the Universal Hypervisor Integration API, a flexible integration...

Happy birthday, Windows! 40 years of operating system history and still going strong.

Exactly 40 years ago, on November 20, 1985, Microsoft released Windows 1.0 , the first version of Windows, which attempted to transform the then-personal computer from a machine with a...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoinnovation
The world’s first humanoid robot store has opened in China. Will we be ready?
Carolina Vivianti - 30/01/2026

At ten o’clock in the morning, in Wuhan, two 1.3-meter-tall humanoid robots begin moving with precision. They turn, jump, and follow a rhythm. It’s the opening signal for the country’s first 7S humanoid robot store,…

Immagine del sitoCulture
Douglas Engelbart was born today: the man who saw and invented the digital future.
Massimiliano Brolli - 30/01/2026

Sometimes, when you think about it, you wonder how we take the world around us for granted. Like, we click, scroll, type, and it all seems so natural, as if it’s always been there. But…

Immagine del sitoCyber News
WhatsApp gets a makeover: “Paranoia” mode arrives (and no, it’s not for everyone).
Silvia Felici - 29/01/2026

WhatsApp has decided to toughen up. Not for everyone, not always, but when needed. The decision comes against a backdrop of a now-familiar climate: increasing cyber attacks, espionage that no longer makes headlines but continues…

Immagine del sitoCybercrime
Beware of “I am not a robot”: the malware trap that uses Google Calendar.
Bajram Zeqiri - 29/01/2026

A new threat is lurking, exploiting our greatest weakness: habit. How many times, in fact, do you find yourself clicking on verification boxes without thinking twice? Now, it seems that malicious people have created a…

Immagine del sitoCybercrime
A blow to the heart of cybercrime: RAMP taken offline. The “temple” of ransomware falls!
Bajram Zeqiri - 28/01/2026

The RAMP (Russian Anonymous Marketplace) forum, one of the main hubs of the international cybercrime underground, has been officially shut down and seized by US law enforcement . The news emerged after the domain associated…