Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
TM RedHotCyber 320x100 042514
Enterprise BusinessLog 970x120 1

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Nessun autore trovato con i filtri selezionati.

Ultimi articoli di Redazione RHC

Disney Invests $1 Billion in OpenAI for Sora Video Deal
Disney will invest $1 billion in OpenAI and officially license its characters for use in its Sora video generator. The deal comes amid a heated debate...
Microsoft 365 Okta Phishing Attack: Experts Warn of New Threat
A recent study by Datadog Security Labs reveals an ongoing operation targeting organizations using Microsoft 365 and Okta for single sign-on (SSO) aut...
React Server Components Vulnerability: Update to Prevent DoS Attacks
The React Server component security saga continues this week. Following the patching of a critical remote code execution (RCE) vulnerability that led ...
Critical Windows PowerShell Vulnerability CVE-2025-54100: Update Now
An urgent security update has been released to address a critical vulnerability in Windows PowerShell that allows attackers to execute malicious code ...
Telegram Losing Ground to Crackdown on Cybercrime Activities
Telegram, which over the course of its history has become one of the most popular messaging apps in the world, is gradually losing its status as a con...
Notepad++ Vulnerability Fixed: Update to 8.8.9 to Avoid Malware
Notepad++ is often targeted by attackers because the software is popular and widely used. A recently discovered vulnerability in the open-source text ...
NetSupport RAT Malware Campaign Uncovered: Expert Analysis
Securonix specialists have discovered a multi-layered malware campaign aimed at secretly installing the NetSupport RAT remote access tool . The attack...
DeadLock Ransomware Exploits Baidu Antivirus Vulnerability for EDR Bypass
Cisco Talos has identified a new ransomware campaign called DeadLock : attackers are exploiting a vulnerable Baidu antivirus driver (CVE-2024-51324) t...
VPN Credentials on the Dark Web: A Growing Cybersecurity Threat
In the darkest corners of the internet, the trafficking of stolen data and unauthorized access continues to thrive. A recent post on a closed undergro...
Uncovering Russia’s Cyber Operations: CISM’s Role in DDoS Attacks
What we wrote in the article ” Patriotic Code: from DDoSia and NoName057(16) to CISM, the algorithm that shapes youth for Putin ” on Red Hot Cyber...
Microsoft Outlook RCE Vulnerability: Update Now to Prevent Attacks
A critical remote code execution (RCE) vulnerability in Outlook has been patched by Microsoft, potentially allowing attackers to run malicious code on...
Google Chrome Urgent Update Fixes Zero-Day Vulnerability
An urgent update has been released by Google for the stable version of the Desktop browser, in order to address an extremely serious vulnerability tha...
EtherRAT Malware Exploits React2Shell Vulnerability with Ethereum C2
Just two days after the critical React2Shell vulnerability was discovered, Sysdig researchers discovered a new malware, EtherRAT, in a compromised Nex...
Is QDay approaching? QuantWare presents its 10,000-qubit quantum processor
The world of quantum technology has made an impressive leap forward: QuantWare has unveiled the world’s first 10,000-qubit processor, 100 times more...
Ivanti Endpoint Manager Vulnerabilities: Update Now to Prevent RCE
Ivanti has released an urgent update for its Endpoint Manager (EPM) platform, addressing a set of significant vulnerabilities that could allow attacke...
Malicious VSCode Extensions Steal Crypto Wallets and Browser Sessions
Two malicious extensions have been discovered that infect developers’ computers with stealer programs on Microsoft’s Visual Studio Code marketplac...
Windows Cloud Files Mini Filter Vulnerability Under Active Exploitation
A zero-day vulnerability in the Windows Cloud Files Mini Filter driver (cldflt.sys) is currently being actively exploited. Microsoft has released urge...
Gartner Warns: AI-Powered Browsers Pose Significant Security Risks to Businesses
Gartner analysts have urged businesses to temporarily stop using browsers with built-in artificial intelligence (AI) capabilities . In a recent adviso...
Asus Hacked: Everest Ransomware Group Claims Data Breach
Asus announced that one of its suppliers had been hacked. Meanwhile, the Everest ransomware group claimed to have stolen a terabyte of data from three...
Fortinet Vulnerability: Critical FortiOS, FortiWeb, FortiProxy, FortiSwitchManager Update
A critical vulnerability affecting the FortiOS, FortiWeb, FortiProxy , and FortiSwitchManager product lines has been reported by Fortinet via an urgen...