Red Hot Cyber. The Cybersecurity Blog

Connected and Vulnerable: How to Secure OT and ICS in 2025
In today’s interconnected world, cybersecurity is not just about protecting information. Today, most devices and physical tools are connected to the network in some way. Whether for its structural operation or for remote maintenance or monitoring activities, all the tools

Darkcloux 3.0 is here: Securonis Linux becomes more secure (and more extreme) than ever
Securonis Linux has released its most significant update: version 3.0 of “Darkcloux” and the 3.0-r1 patch. The release includes new utilities, redesigned components, and improvements to privacy and security. The main change is the end of support for the GNOME environment. From

Urobot watches you while you pee (but it’s for your own good)
A Taiwanese hospital is testing Urobot, a smart urinal that instantly analyzes urine and emails the results. Although the device is designed in a “cute” style, social media users have noted that it looks scary and causes discomfort to patients.

Smart TV or Living Room Spies? Here’s How They’re Monitoring You
Many owners of smart TV operating systems are increasingly finding themselves caught in a conflict that rages between the desire to preserve viewer privacy and pressure from the advertising industry. The point is that TV manufacturers and embedded software developers

Massive Windows Crash: The OpenVPN Flaw That Can Knock Out Infrastructures
A critical vulnerability has been discovered in the OpenVPN data channel offload driver for Windows, which can be exploited by local attackers to crash systems. The bug, classified as CVE-2025-50054, is a buffer overflow that affects 1.3.0 and earlier versions

Android Under Attack: Godfather Malware Now Uses Virtualization to Fool Everyone
A new version of Android malware Godfather has been discovered that creates isolated virtual environments on mobile devices to steal data from banking applications. Recall that Godfather was first discovered in March 2021 by researchers at ThreatFabric. Since then, the banking malware

REvil: Sentenced but then set free. The most controversial court case ever
Redazione RHC - June 26th, 2025
Do you remember the infamous REvil cyber gang? The Russian hacker group responsible for some of the most devastating ransomware attacks in the early days of this global threat, known...

Shock in France: the gentlemen of BreachForums were twenty-year-old French citizens!
Redazione RHC - June 25th, 2025
Shocking news in France: one of the largest global cybercrime networks dismantled. The BreachForum hackers were… French. French authorities have busted a large cybercrime operation, arresting five young French hackers...

Zero-Click Attack on Notepad++. HackerHood Tested the Exploit and It Really Works with Little
Redazione RHC - June 25th, 2025
A dangerous vulnerability has been discovered in the latest version of the popular text editor Notepad++ that allows an attacker togain complete control over the system. The vulnerability has been...

22,000 Sites At Risk: New Motors WordPress Vulnerability Allows Total Hacking
Redazione RHC - June 25th, 2025
Attackers are actively exploiting a critical privilege escalation vulnerability in the WordPress Motors theme, allowing them to hijack administrator accounts and take complete control of the target site. The malicious activity was...
Sign up for the newsletter