Welcome to Red Hot Cyber | Cybersecurity News
Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320x100 Itcentric
Banner Ancharia Desktop 1 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Microsoft Defender incorrectly flags SQL Server 2019 as End of Life

We know that product end-of-life (EoL) brings security risks and the accumulation of vulnerabilities, as manufacturers stop releasing corrective patches....
Redazione RHC - 10 October 2025

The Truth About Windows XP License Key: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8

On October 10, new revelations emerged regarding one of the most notorious license keys in computing history: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8 , tied...
Redazione RHC - 10 October 2025

Intel and NVIDIA: From Historic Rivals to Partners in the New Artificial Intelligence Market

During an interview with Mad Money host Jim Cramer, NVIDIA CEO Jen-Hsun Huang recalled a key moment from his time...
Redazione RHC - 10 October 2025

7-Zip Vulnerable: Symbolic Link Exploit Allows Malicious Code Injection

Two critical vulnerabilities in the 7-Zip archiver allowed remote code execution when processing ZIP files. The flaws affect how the...
Redazione RHC - 10 October 2025

Salesforce refuses to pay ransom for Scattered Lapsus Hunters attacks

Salesforce representatives have announced that they have no intention of negotiating or paying a ransom to the attackers responsible for...
Redazione RHC - 10 October 2025

40,000 iPhones stolen and shipped to Asia: London police arrest international gang

London police announced that Operation Echosteep has uncovered and dismantled a gang responsible for mass iPhone thefts. Investigators estimate the...
Redazione RHC - 10 October 2025

Vibe Coding: Revolution or Security Risk?

Martyn Ditchburn, CTO in residence Zscaler Artificial intelligence, like any technology, is not inherently good or bad: it all depends on who uses it and for what purpose. What is...
Share on Facebook Share on LinkedIn Share on X

Critical vulnerabilities in NetScaler ADC and Gateway. Update now! Attacks are ongoing!

NetScaler has alerted administrators of three new vulnerabilities in NetScaler ADC and NetScaler Gateway, one of which is already being used in active attacks. Updates are available and the vendor...
Share on Facebook Share on LinkedIn Share on X

The Democratization of Cybercrime Has Arrived! “I Can’t Code, But I Write Ransomware”

Cybercriminals are rapidly mastering generative AI, and we're no longer talking about "scary" ransom notes, but about full-fledged malware development. The Anthropic research team reported that attackers are increasingly relying...
Share on Facebook Share on LinkedIn Share on X

FreePBX under attack: Zero-day exploit already in use, emergency patch released

The world of VoIP telephony has once again ended up in the crosshairs of cybercriminals. This time it's FreePBX, the open-source platform built on Asterisk and widely used by companies,...
Share on Facebook Share on LinkedIn Share on X

Storm-0501: When Ransomware Moves to the Cloud

Microsoft is raising the alarm: the Storm-0501 cybercriminal group has evolved. No more "traditional" attacks on on-premise machines, no more ransomware that encrypts local files. Now the threat is moving...
Share on Facebook Share on LinkedIn Share on X

Microsoft Teams crashes: Embedded Office documents blocked from opening

A Black Thursday for millions of Microsoft Teams users around the world. A key feature of the collaboration platform – opening embedded Office documents – has suddenly been knocked out,...
Share on Facebook Share on LinkedIn Share on X

ChatGPT “Taught My Son How to Die”! Adam Reid’s Parents Sue OpenAI

A lawsuit has been filed against OpenAI in California, alleging that ChatGPT driven a 16-year-old to commit suicide. The parents of Adam Reid, who died on April 11, 2025, said...
Share on Facebook Share on LinkedIn Share on X

By 2026, no more “ghost” apps: Android will only accept verified developers.

Google representatives announced that starting in 2026, only apps from verified developers will be able to be installed on certified Android devices. This measure aims to combat malware and financial...
Share on Facebook Share on LinkedIn Share on X

Devastating Cyber Attack Paralyzes Nevada Government Network

Nevada's government network was paralyzed after an incident in the early morning hours of August 24. The attack rendered the state's IT infrastructure inoperable and forced most offices to close...
Share on Facebook Share on LinkedIn Share on X

Auchan data leak: hundreds of thousands of customers affected by a hacker attack

French retailer Auchan has informed hundreds of thousands of customers that their personal data has been stolen following a hacker attack. In notifications sent to users last week, the company...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sito
DIG AI: The Dark Web’s New AI Tool for Cybercrime
Redazione RHC - 21/12/2025

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…

Immagine del sito
Airbus Eyes Sovereign Cloud to Mitigate US Data Risks
Redazione RHC - 21/12/2025

In recent months, a question has been emerging with increasing insistence on European corporate boards: is the US cloud really safe for all companies? Especially for those operating in strategic sectors or with economic, industrial,…

Immagine del sito
North Korean Hackers Steal $2 Billion in Crypto, Targeting DeFi Sector
Redazione RHC - 21/12/2025

In 2025, North Korean hackers stole a record $2 billion in cryptocurrency , 51% more than the previous year. However, the number of attacks has decreased, while the damage has increased. According to Chainalysis, North…

Immagine del sito
Linux Kernel CVE-2025-68260 Vulnerability Fixed: Rust Code at Risk
Redazione RHC - 19/12/2025

The world of technology is a veritable battlefield, where coding geniuses challenge malicious attackers every day with exploits and security patches. That’s why the recent discovery of a vulnerability in the Linux kernel has caused…

Immagine del sito
HPE OneView Vulnerability CVE-2025-37164: Critical Security Update Required
Redazione RHC - 18/12/2025

Cybersecurity is a serious issue, especially when it comes to vulnerabilities that can compromise an entire system. Well, Hewlett Packard Enterprise (HPE) has just raised the alarm about a truly worrying security flaw in its…