Red Hot Cyber. The Cybersecurity Blog
Let the hunt begin! Hackers exploit Citrix flaw to infiltrate global systems
A critical zero-day flaw, classified as CVE-2025-6543, has been discovered in Citrix NetScaler systems. This vulnerability has been actively exploited by malicious hackers since May 2025, several mont...
Phishing on Teams: at least the hacker responds faster than the real help desk!
In recent months, as previously reported on Red Hot Cyber, a new front has emerged in the corporate phishing landscape: Microsoft Teams attacks in which attackers impersonate IT or help desk personnel...
Critical vulnerabilities in NetScaler ADC and Gateway. Update now! Attacks are ongoing!
NetScaler has alerted administrators of three new vulnerabilities in NetScaler ADC and NetScaler Gateway, one of which is already being used in active attacks. Updates are available and the vendor urg...
Storm-0501: When Ransomware Moves to the Cloud
Microsoft is raising the alarm: the Storm-0501 cybercriminal group has evolved. No more “traditional” attacks on on-premise machines, no more ransomware that encrypts local files. Now the threat is mo...
Microsoft Teams crashes: Embedded Office documents blocked from opening
A Black Thursday for millions of Microsoft Teams users around the world. A key feature of the collaboration platform – opening embedded Office documents – has suddenly been knocked out, sparking frust...
Happy birthday Windows 95: the system that changed PCs forever!
August 24, 2025, marked the 30th anniversary of the launch of Windows 95, Microsoft’s first mass-market 32-bit consumer operating system, which significantly revolutionized the world of personal compu...
RDP Under Fire! 30,000 Unique IP Addresses Probe Exposed Services for Targeted Attacks
Security researchers at greyNoise have detected a large, coordinated scanning operation against Microsoft Remote Desktop Protocol (RDP) services, in which attackers scanned over 30,000 unique IP addre...
UK: Strict rules for online age verification. Pornhub and YouPorn will comply.
Starting Friday, adults in the UK who try to access pornographywill have to prove they are over 18, under some of the strictest regulations in the world. The change means that, instead of having to pr...
The Robot Girlfriend is coming! The new frontier of Chinese-made technology.
While the rise of robots in China, the world’s largest market and producer of robots, is attracting the attention of the global information technology (IT) industry, the emergence of a “girlfriend rob...
29,000 Exchange servers at risk. The exploit for CVE-2025-53786 is under exploitation.
29,000 Exchange servers are vulnerable to CVE-2025-53786, which allows attackers to move within Microsoft cloud environments, potentially leading to complete domain compromise. CVE-2025-53786 allows a...
Featured Articles

A critical zero-day flaw, classified as CVE-2025-6543, has been discovered in Citrix NetScaler systems. This vulnerability has been actively exploited by malicious hackers since May 2025, several mont...

In recent months, as previously reported on Red Hot Cyber, a new front has emerged in the corporate phishing landscape: Microsoft Teams attacks in which attackers impersonate IT or help desk personnel...

NetScaler has alerted administrators of three new vulnerabilities in NetScaler ADC and NetScaler Gateway, one of which is already being used in active attacks. Updates are available and the vendor urg...

Microsoft is raising the alarm: the Storm-0501 cybercriminal group has evolved. No more “traditional” attacks on on-premise machines, no more ransomware that encrypts local files. Now the threat i...

A Black Thursday for millions of Microsoft Teams users around the world. A key feature of the collaboration platform – opening embedded Office documents – has suddenly been knocked out, sparking f...

DeepSeek launches version 3.1 of its AI model with support for Chinese chips
There was a day when DeepSeek surprised half the world by demonstrating that much could be done with less. Today it returns with version 3.1 and a message that doesn’t go unnoticed: the model has been prepared for the next

Microsoft is investigating an Exchange Online outage affecting the Outlook mobile app
A serious issue with the Exchange Online service, flagged as EX1137017, is currently under investigation by Microsoft. Due to this issue, a number of users are unable to send or receive email messages through the Outlook mobile app. This issue

Can a file name compromise a Linux system? Chinese hackers say so
Researchers at Trellix have discovered an unusual attack pattern on Linux, in which the key element is not an attachment with malicious content, but the name of the file within the archive itself. The campaign begins with a mass email

Beware of dissatisfied employees! Four years in prison for bringing his former company to its knees.
A former employee has been convicted of intentionally committing digital sabotage against his employer. Davis Lu, 55, a Chinese citizen living in Houston, was sentenced to four years in prison and three years of supervised release after being convicted of

When a VPN Becomes a Spy! FreeVPN.One Takes Unauthorized Screenshots
Koi Security experts warn that the behavior of the popular Chrome extension FreeVPN.One has recently changed. It has begun secretly capturing screenshots of users’ activity and transmitting them to a remote server. “The FreeVPN.One case illustrates how a privacy-protecting product

RapperBot DDoS botnet dismantled and alleged developer arrested
The U.S. Department of Justice has indicted the alleged developer and administrator of the RapperBot DDoS botnet, which was leased to cybercriminals. The botnet itself was seized by law enforcement in early August as part of Operation PowerOff. RapperBot (also

PromptLock Arrives. The First Artificial Intelligence-Powered Ransomware for Windows and Linux
Redazione RHC - August 27th, 2025
Finally (metaphorically speaking), we're here. ESET experts have reported the first ransomware program in which artificial intelligence plays a key role. The new sample has been named PromptLock. It is...

UNC6395 campaign aims to exfiltrate Salesforce data via compromised OAuth tokens
Redazione RHC - August 27th, 2025
A sophisticated data exfiltration campaign targeting companies' Salesforce instances was conducted, resulting in the exposure of sensitive information from several organizations. This occurred through compromised OAuth tokens associated with the...

Supercomputer: Fugaku NEXT will be Japan’s first zetta-class supercomputer
Redazione RHC - August 27th, 2025
RIKEN, Fujitsu, and Nvidia are collaborating on the development of FugakuNEXT, Japan's new flagship supercomputer, scheduled to become operational at the RIKEN campus in Kobe around 2030. With an estimated...

Intel Website Vulnerabilities: 270,000 Employees at Risk
Redazione RHC - August 26th, 2025
An attack on Intel's internal resources has demonstrated that vulnerabilities can be found not only in processors, but also in company websites. A security researcher discovered four different ways to...
Sign up for the newsletter