Red Hot Cyber. The Cybersecurity Blog
12 security bugs discovered in Ivanti Endpoint Manager (EPM). Update now!
Ivanti has published 13 vulnerabilities in its Endpoint Manager (EPM) software , including two high-severity flaws that could allow remote code execution and privilege escalation . Despite the lack of...
WhatsApp Web in the crosshairs! How the worm that distributes the banking Trojan works
Sophos analysts have discovered a complex malware operation by security experts that uses the popular messaging service WhatsApp to spread banking Trojans, targeting Brazilian banks and cryptocurrency...
RMPocalypse: A critical bug in AMD SEV-SNP threatens cloud security.
A critical vulnerability has been identified in the AMD SEV-SNP hardware security architecture, impacting major cloud providers (AWS, Microsoft Azure, and Google Cloud) . This flaw allows malicious hy...
Spyware yes, spyware no: it’s just a prospect! NSO Group is now under US control.
Israeli company NSO Group, developer of the infamous Pegasus spyware , recently came under the control of American investors. A company spokesperson announced that the new funding amounts to tens of m...
DAS: The world’s ear hidden in submarine cables
Over 1.2 million kilometers of fiber optic cables lie on the ocean floor, long considered solely part of a global telecommunications network. However, distributed acoustic sensing (DAS) technology , r...
Between AI and fear, Skynet teaches: “We’ll build bunkers before launching AGI.”
The quote, “We’ll definitely build a bunker before we launch AGI,” that inspired the article, was attributed to a Silicon Valley leader, though it’s unclear who exactly he meant by “we.” The phrase pe...
RDP Services Exposed in the Crosshairs! A Botnet of 100,000 IPs Scans the Network
In the United States, a large-scale, coordinated botnet campaign is targeting Remote Desktop Protocol (RDP)-based services. The scale and organizational structure of this campaign poses a significant ...
Everyone’s Hacking iPhones! Apple Increases iOS Reward to $5 Million
Apple has significantly expanded its bounty program for security vulnerabilities in the iOS ecosystem. At the Hexacon offensive security conference in Paris, Ivan Krstic, the company’s vice pres...
40,000 iPhones stolen and shipped to Asia: London police arrest international gang
London police announced that Operation Echosteep has uncovered and dismantled a gang responsible for mass iPhone thefts. Investigators estimate the group is responsible for 40% of all phone thefts in ...
Oracle E-Business Suite Zero-Day Attack: Clop Exploits CVE-2025-61882
Last week, Oracle warned customers of a critical zero-day vulnerability in its E-Business Suite (CVE-2025-61882), which allows remote execution of arbitrary code without authentication. It has now bee...
Featured Articles

Ivanti has published 13 vulnerabilities in its Endpoint Manager (EPM) software , including two high-severity flaws that could allow remote code execution and privilege escalation . Despite the lack of...

Sophos analysts have discovered a complex malware operation by security experts that uses the popular messaging service WhatsApp to spread banking Trojans, targeting Brazilian banks and cryptocurrency...

A critical vulnerability has been identified in the AMD SEV-SNP hardware security architecture, impacting major cloud providers (AWS, Microsoft Azure, and Google Cloud) . This flaw allows malicious hy...

Israeli company NSO Group, developer of the infamous Pegasus spyware , recently came under the control of American investors. A company spokesperson announced that the new funding amounts to tens of m...

Over 1.2 million kilometers of fiber optic cables lie on the ocean floor, long considered solely part of a global telecommunications network. However, distributed acoustic sensing (DAS) technology , r...
12 security bugs discovered in Ivanti Endpoint Manager (EPM). Update now!
A PNG containing a Trojan. Astaroth persistently abuses GitHub.
Satellites targeted! Thousands of phone conversations and text messages intercepted.
Internet Explorer is “dead,” but it continues to infect PCs with its bugs via Edge
Nanochat: Create your own LLM, train it, and get it running on your PC for $100
Jeff Bezos at Italian Tech Week: “Millions of people will live in space.”

12 security bugs discovered in Ivanti Endpoint Manager (EPM). Update now!
Redazione RHC - October 14th, 2025
Ivanti has published 13 vulnerabilities in its Endpoint Manager (EPM) software , including two high-severity flaws that could allow remote code execution and privilege escalation . Despite the lack of...

A PNG containing a Trojan. Astaroth persistently abuses GitHub.
Redazione RHC - October 14th, 2025
McAfee researchers have reported new activity by the Astaroth banking trojan , which has started using GitHub as a persistent channel for distributing configuration data. This approach allows attackers to...

Satellites targeted! Thousands of phone conversations and text messages intercepted.
Redazione RHC - October 14th, 2025
Satellite communications links used by government agencies, the military, businesses, and mobile operators have been discovered to be the source of a massive data leak. Researchers at the University of...

Internet Explorer is “dead,” but it continues to infect PCs with its bugs via Edge
Luca Galuppi - October 14th, 2025
While Internet Explorer has officially been out of support since June 2022, Microsoft recently faced a threat that exploited Internet Explorer Mode (IE Mode) in Edge , which was designed...

Nanochat: Create your own LLM, train it, and get it running on your PC for $100
Redazione RHC - October 14th, 2025
Developer Andrej Karpathy has unveiled nanochat , a minimalist, fully open-source version of ChatGPT that can be trained and run on a single computer. Designed as a learning platform for...

Jeff Bezos at Italian Tech Week: “Millions of people will live in space.”
Carlo Denza - October 14th, 2025
Data centers in space, lunar landers, Martian missions: the future designed by Bezos in Turin. But the real revelation is the anecdote about his grandfather that reveals his human profile....
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE