Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Developers and administrators around the world are urgently updating their servers following the discovery of a critical vulnerability in React Server, which allows attackers to remotely execute unaut...

During the registration process, a critical security flaw (CVE-2025-8489) in the King Addons WordPress Elementor plugin was exploited by attackers, allowing them to gain administrative privileges via ...

Since ChatGPT’s public release in November 2022, artificial intelligence (AI) has been integrated into many aspects of human society. For owners and operators of critical infrastructure, AI can be u...

A botnet service called Aisuru offers an army of compromised IoT devices and routers to launch high-traffic DDoS attacks. In just three months, the massive Aisuru botnet launched more than 1,300 DDoS ...

A joint investigation by BCA LTD, NorthScan, and ANY.RUN has exposed one of North Korea’s most secretive hacking schemes. Under the guise of routine recruitment, the team monitored how operators fro...
Microsoft Fixes Old Windows LNK Vulnerability Exploited in Attacks
Critical React Server Vulnerability: Update Now to Prevent RCE Attacks
Critical Vulnerability in King Addons for Elementor Exploited
Google Discover AI Headlines: Revolutionizing News Feed or Clickbait Nightmare?
Storm-0900 Phishing Campaign Spreads XWorm Malware
Windows 10 Still Running on 1 Billion PCs, Upgrade to Windows 11 Urged

Microsoft Fixes Old Windows LNK Vulnerability Exploited in Attacks
Redazione RHC - December 3rd, 2025
Microsoft has quietly patched a long-standing Windows vulnerability that has been exploited in real-world attacks for several years. The update was released on November's Patch Tuesday, despite the company having...

Critical React Server Vulnerability: Update Now to Prevent RCE Attacks
Redazione RHC - December 3rd, 2025
Developers and administrators around the world are urgently updating their servers following the discovery of a critical vulnerability in React Server, which allows attackers to remotely execute unauthenticated code with...

Critical Vulnerability in King Addons for Elementor Exploited
Redazione RHC - December 3rd, 2025
During the registration process, a critical security flaw (CVE-2025-8489) in the King Addons WordPress Elementor plugin was exploited by attackers, allowing them to gain administrative privileges via a privilege escalation...

Google Discover AI Headlines: Revolutionizing News Feed or Clickbait Nightmare?
Redazione RHC - December 3rd, 2025
Google is testing AI-generated headlines in its Discover feed, replacing original news headlines with original ones. Sean Hollister, editor-in-chief of The Verge, reported this , noting that short and often...

Storm-0900 Phishing Campaign Spreads XWorm Malware
Redazione RHC - December 3rd, 2025
Over the holiday season, a coordinated attack was detected and blocked by Microsoft Threat Intelligence security analysts, involving tens of thousands of emails crafted to deceive recipients. The cybercriminal group...

Windows 10 Still Running on 1 Billion PCs, Upgrade to Windows 11 Urged
Redazione RHC - December 3rd, 2025
Windows 10 has been officially retired, but it still runs on approximately one billion personal computers worldwide. A significant number of devices are technically ready to upgrade to Windows 11,...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

