Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Efforts by legislators and law enforcement to combat money laundering and more complex SIM card verification procedures have not significantly weakened the position of anonymous number dealers. This c...

Developers and administrators around the world are urgently updating their servers following the discovery of a critical vulnerability in React Server, which allows attackers to remotely execute unaut...

During the registration process, a critical security flaw (CVE-2025-8489) in the King Addons WordPress Elementor plugin was exploited by attackers, allowing them to gain administrative privileges via ...

Since ChatGPT’s public release in November 2022, artificial intelligence (AI) has been integrated into many aspects of human society. For owners and operators of critical infrastructure, AI can be u...

A botnet service called Aisuru offers an army of compromised IoT devices and routers to launch high-traffic DDoS attacks. In just three months, the massive Aisuru botnet launched more than 1,300 DDoS ...
Leroy Merlin Cyberattack Exposes Personal Data of French Customers
Anonymity for Sale: Russian SIM Card Market Thrives Amid Regulations
Hackers Compromise 120k IP Cameras for Pornographic Videos
Microsoft Fixes Old Windows LNK Vulnerability Exploited in Attacks
Critical React Server Vulnerability: Update Now to Prevent RCE Attacks
Critical Vulnerability in King Addons for Elementor Exploited

Leroy Merlin Cyberattack Exposes Personal Data of French Customers
Redazione RHC - December 3rd, 2025
A cyberattack has affected Leroy Merlin, involving the personal data of numerous customers in France, impacting hundreds of thousands of individuals. Leroy Merlin assures that "additional security measures have been...

Anonymity for Sale: Russian SIM Card Market Thrives Amid Regulations
Redazione RHC - December 3rd, 2025
Efforts by legislators and law enforcement to combat money laundering and more complex SIM card verification procedures have not significantly weakened the position of anonymous number dealers. This conclusion emerges...

Hackers Compromise 120k IP Cameras for Pornographic Videos
Redazione RHC - December 3rd, 2025
South Korean police have reported the arrest of four individuals who, presumably independently, compromised over 120,000 IP cameras. According to investigators, at least two of them did so to steal...

Microsoft Fixes Old Windows LNK Vulnerability Exploited in Attacks
Redazione RHC - December 3rd, 2025
Microsoft has quietly patched a long-standing Windows vulnerability that has been exploited in real-world attacks for several years. The update was released on November's Patch Tuesday, despite the company having...

Critical React Server Vulnerability: Update Now to Prevent RCE Attacks
Redazione RHC - December 3rd, 2025
Developers and administrators around the world are urgently updating their servers following the discovery of a critical vulnerability in React Server, which allows attackers to remotely execute unauthenticated code with...

Critical Vulnerability in King Addons for Elementor Exploited
Redazione RHC - December 3rd, 2025
During the registration process, a critical security flaw (CVE-2025-8489) in the King Addons WordPress Elementor plugin was exploited by attackers, allowing them to gain administrative privileges via a privilege escalation...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

