Welcome to Red Hot Cyber | Cybersecurity News
Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
320x100 Itcentric
Enterprise BusinessLog 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Gartner Warns: AI-Powered Browsers Pose Significant Security Risks to Businesses
Di Redazione RHC - 10/12/2025

Gartner analysts have urged businesses to temporarily stop using browsers with built-in artificial intelligence (AI) capabilities . In a recent advisory, the company emphasizes that such tools pose un...

Immagine del sito
Fortinet Vulnerability: Critical FortiOS, FortiWeb, FortiProxy, FortiSwitchManager Update
Di Redazione RHC - 10/12/2025

A critical vulnerability affecting the FortiOS, FortiWeb, FortiProxy , and FortiSwitchManager product lines has been reported by Fortinet via an urgent security advisory. This advisory was issued in c...

Immagine del sito
US Allows Nvidia to Sell Advanced AI Chips to China, Easing Export Restrictions
Di Redazione RHC - 09/12/2025

It seems the White House isn’t entirely clear … at least judging by yet another change of heart regarding the sale of Nvidia’s advanced chips to China, with the Trump administration having decid...

Immagine del sito
Ransomware Attacks Decline in 2024, But Threat Remains High with $734M in Ransom
Di Redazione RHC - 09/12/2025

According to a recently released report by the Financial Crimes Enforcement Network (FinCEN) , global ransomware activity peaked in 2023, only to plummet in 2024. This decline is attributed to success...

Immagine del sito
Intellexa Exploits Zero-Day Vulnerabilities with Spyware
Di Redazione RHC - 08/12/2025

Despite significant geopolitical challenges, the mercenary spyware industry remains a resilient and persistent threat; in this context, the well-known vendor Intellexa continues to expand its arsenal....

Is QDay approaching? QuantWare presents its 10,000-qubit quantum processor

The world of quantum technology has made an impressive leap forward: QuantWare has unveiled the world's first 10,000-qubit processor, 100 times more t...
Redazione RHC - 10/12/2025 - 19:22

Ivanti Endpoint Manager Vulnerabilities: Update Now to Prevent RCE

Ivanti has released an urgent update for its Endpoint Manager (EPM) platform, addressing a set of significant vulnerabilities that could allow attacke...
Redazione RHC - 10/12/2025 - 15:59

Malicious VSCode Extensions Steal Crypto Wallets and Browser Sessions

Two malicious extensions have been discovered that infect developers' computers with stealer programs on Microsoft's Visual Studio Code marketplace. T...
Redazione RHC - 10/12/2025 - 14:13

Windows Cloud Files Mini Filter Vulnerability Under Active Exploitation

A zero-day vulnerability in the Windows Cloud Files Mini Filter driver (cldflt.sys) is currently being actively exploited. Microsoft has released urge...
Redazione RHC - 10/12/2025 - 10:22

The Dark Side of AI: How Technology is Being Used to Control Humans

Cory Doctorow says it with the clarity of someone who has studied the consequences of digital capitalism for years: AI, as it's sold today, isn't abou...
Sandro Sana - 10/12/2025 - 08:12

Gartner Warns: AI-Powered Browsers Pose Significant Security Risks to Businesses

Gartner analysts have urged businesses to temporarily stop using browsers with built-in artificial intelligence (AI) capabilities . In a recent adviso...
Redazione RHC - 10/12/2025 - 08:11
1 2 3 274

Is QDay approaching? QuantWare presents its 10,000-qubit quantum processor

- December 9th, 2025

The world of quantum technology has made an impressive leap forward: QuantWare has unveiled the world's first 10,000-qubit processor, 100 times more than any existing device . Furthermore, the new...

Facebook Linkedin X

Ivanti Endpoint Manager Vulnerabilities: Update Now to Prevent RCE

- December 9th, 2025

Ivanti has released an urgent update for its Endpoint Manager (EPM) platform, addressing a set of significant vulnerabilities that could allow attackers to execute code of their choosing or hijack...

Facebook Linkedin X

Malicious VSCode Extensions Steal Crypto Wallets and Browser Sessions

- December 9th, 2025

Two malicious extensions have been discovered that infect developers' computers with stealer programs on Microsoft's Visual Studio Code marketplace. The malware can take screenshots, steal passwords and cryptocurrency wallets, and...

Facebook Linkedin X

Windows Cloud Files Mini Filter Vulnerability Under Active Exploitation

- December 9th, 2025

A zero-day vulnerability in the Windows Cloud Files Mini Filter driver (cldflt.sys) is currently being actively exploited. Microsoft has released urgent security updates to address this vulnerability. The vulnerability is...

Facebook Linkedin X

The Dark Side of AI: How Technology is Being Used to Control Humans

- December 9th, 2025

Cory Doctorow says it with the clarity of someone who has studied the consequences of digital capitalism for years: AI, as it's sold today, isn't about enhancing humans. It's about...

Facebook Linkedin X

Gartner Warns: AI-Powered Browsers Pose Significant Security Risks to Businesses

- December 9th, 2025

Gartner analysts have urged businesses to temporarily stop using browsers with built-in artificial intelligence (AI) capabilities . In a recent advisory, the company emphasizes that such tools pose unnecessary risks...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE