Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Group-IB experts presented a detailed analysis of the long-running UNC2891 campaign, which demonstrated the continuing sophistication of ATM attack schemes. Attention focused on the Raspberry Pi, whic...

Israeli company NSO Group has appealed a California federal court ruling that bars it from using WhatsApp’s infrastructure to distribute its Pegasus surveillance software. The case, which has been o...

A vulnerability, designated CVE-2025-61757, was made public by Searchlight Cyber last Thursday. Company researchers discovered the issue and notified Oracle, which led to its disclosure. Oracle fixed ...

Microsoft has disclosed a critical vulnerability in SharePoint Online (discovered by RHC through our ongoing monitoring of critical CVEs on our portal), identified as CVE‑2025‑59245 , with a CVSS ...

The ransomware landscape is changing. The most exposed actors—LockBit, Hunters International, and Trigona—have paid the price for overexposure, including international operations, infiltrations, d...
Future prospects for computer science and technology graduates
ATMs targeted! Cybersecurity experts reveal an attack campaign targeting ATMs.
Google Gemini Improves AI-Generated Image Verification
“We Want to Hack You Again!” NSO Group Rejects WhatsApp’s Pegasus Lawsuit
Oracle under attack: Pre-auth RCE vulnerability discovered that compromises entire systems
CrowdStrike Insider Fired for Providing Sensitive Data to Criminal Hackers

Future prospects for computer science and technology graduates
Redazione RHC - November 23rd, 2025
Artificial intelligence is changing the way recent computer science graduates approach the world of work. It's not about sudden job disappearances , but rather a transformation of entry-level roles in...

ATMs targeted! Cybersecurity experts reveal an attack campaign targeting ATMs.
Redazione RHC - November 23rd, 2025
Group-IB experts presented a detailed analysis of the long-running UNC2891 campaign, which demonstrated the continuing sophistication of ATM attack schemes. Attention focused on the Raspberry Pi, which the attackers used...

Google Gemini Improves AI-Generated Image Verification
Redazione RHC - November 23rd, 2025
Google has expanded the capabilities of its Gemini artificial intelligence service by adding a tool to the app and web version to check images for signs of automatic generation ....

“We Want to Hack You Again!” NSO Group Rejects WhatsApp’s Pegasus Lawsuit
Redazione RHC - November 22nd, 2025
Israeli company NSO Group has appealed a California federal court ruling that bars it from using WhatsApp's infrastructure to distribute its Pegasus surveillance software. The case, which has been ongoing...

Oracle under attack: Pre-auth RCE vulnerability discovered that compromises entire systems
Redazione RHC - November 22nd, 2025
A vulnerability, designated CVE-2025-61757, was made public by Searchlight Cyber last Thursday. Company researchers discovered the issue and notified Oracle, which led to its disclosure. Oracle fixed CVE-2025-61757 with the...

CrowdStrike Insider Fired for Providing Sensitive Data to Criminal Hackers
Redazione RHC - November 22nd, 2025
In recent months, the insider problem has become increasingly important for large companies , and one recent episode involved CrowdStrike. The cybersecurity firm has in fact removed an employee believed...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

