Welcome to Red Hot Cyber | Cybersecurity News
Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
UtiliaCS 320x100
UtiliaCS 970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
DeadLock Ransomware Exploits Baidu Antivirus Vulnerability for EDR Bypass
Di Redazione RHC - 11/12/2025

Cisco Talos has identified a new ransomware campaign called DeadLock : attackers are exploiting a vulnerable Baidu antivirus driver (CVE-2024-51324) to disable EDR systems using the Bring Your Own Vul...

Immagine del sito
Uncovering Russia’s Cyber Operations: CISM’s Role in DDoS Attacks
Di Redazione RHC - 11/12/2025

What we wrote in the article ” Patriotic Code: from DDoSia and NoName057(16) to CISM, the algorithm that shapes youth for Putin ” on Red Hot Cyber on July 23rd is now fully consistent with the inf...

Immagine del sito
Gartner Warns: AI-Powered Browsers Pose Significant Security Risks to Businesses
Di Redazione RHC - 10/12/2025

Gartner analysts have urged businesses to temporarily stop using browsers with built-in artificial intelligence (AI) capabilities . In a recent advisory, the company emphasizes that such tools pose un...

Immagine del sito
Fortinet Vulnerability: Critical FortiOS, FortiWeb, FortiProxy, FortiSwitchManager Update
Di Redazione RHC - 10/12/2025

A critical vulnerability affecting the FortiOS, FortiWeb, FortiProxy , and FortiSwitchManager product lines has been reported by Fortinet via an urgent security advisory. This advisory was issued in c...

Immagine del sito
US Allows Nvidia to Sell Advanced AI Chips to China, Easing Export Restrictions
Di Redazione RHC - 09/12/2025

It seems the White House isn’t entirely clear … at least judging by yet another change of heart regarding the sale of Nvidia’s advanced chips to China, with the Trump administration having decid...

Digital Stress: How to Achieve Balance in a Hyper-Connected World

We live in dissociation: we praise work-life balance, yet we find ourselves constantly online, like puppets on invisible strings. The real problem is ...
Daniela Farina - 11/12/2025 - 15:14

DeadLock Ransomware Exploits Baidu Antivirus Vulnerability for EDR Bypass

Cisco Talos has identified a new ransomware campaign called DeadLock : attackers are exploiting a vulnerable Baidu antivirus driver (CVE-2024-51324) t...
Redazione RHC - 11/12/2025 - 12:44

VPN Credentials on the Dark Web: A Growing Cybersecurity Threat

In the darkest corners of the internet, the trafficking of stolen data and unauthorized access continues to thrive. A recent post on a closed undergro...
Redazione RHC - 11/12/2025 - 09:54

Uncovering Russia’s Cyber Operations: CISM’s Role in DDoS Attacks

What we wrote in the article " Patriotic Code: from DDoSia and NoName057(16) to CISM, the algorithm that shapes youth for Putin " on Red Hot Cyber on ...
Redazione RHC - 11/12/2025 - 09:34

Microsoft Outlook RCE Vulnerability: Update Now to Prevent Attacks

A critical remote code execution (RCE) vulnerability in Outlook has been patched by Microsoft, potentially allowing attackers to run malicious code on...
Redazione RHC - 11/12/2025 - 07:36

Google Chrome Urgent Update Fixes Zero-Day Vulnerability

An urgent update has been released by Google for the stable version of the Desktop browser, in order to address an extremely serious vulnerability tha...
Redazione RHC - 11/12/2025 - 07:19
1 2 3 275

Digital Stress: How to Achieve Balance in a Hyper-Connected World

- December 10th, 2025

We live in dissociation: we praise work-life balance, yet we find ourselves constantly online, like puppets on invisible strings. The real problem is not technology, but how we, humans, respond...

Facebook Linkedin X

DeadLock Ransomware Exploits Baidu Antivirus Vulnerability for EDR Bypass

- December 10th, 2025

Cisco Talos has identified a new ransomware campaign called DeadLock : attackers are exploiting a vulnerable Baidu antivirus driver (CVE-2024-51324) to disable EDR systems using the Bring Your Own Vulnerable...

Facebook Linkedin X

VPN Credentials on the Dark Web: A Growing Cybersecurity Threat

- December 10th, 2025

In the darkest corners of the internet, the trafficking of stolen data and unauthorized access continues to thrive. A recent post on a closed underground forum shows 896 FortiSSL VPN...

Facebook Linkedin X

Uncovering Russia’s Cyber Operations: CISM’s Role in DDoS Attacks

- December 10th, 2025

What we wrote in the article " Patriotic Code: from DDoSia and NoName057(16) to CISM, the algorithm that shapes youth for Putin " on Red Hot Cyber on July 23rd...

Facebook Linkedin X

Microsoft Outlook RCE Vulnerability: Update Now to Prevent Attacks

- December 10th, 2025

A critical remote code execution (RCE) vulnerability in Outlook has been patched by Microsoft, potentially allowing attackers to run malicious code on vulnerable systems. The vulnerability, tracked under CVE-2025-62562, stems...

Facebook Linkedin X

Google Chrome Urgent Update Fixes Zero-Day Vulnerability

- December 10th, 2025

An urgent update has been released by Google for the stable version of the Desktop browser, in order to address an extremely serious vulnerability that is currently being exploited. This...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE