Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Enterprise BusinessLog 320x200 1
2nd Edition GlitchZone RHC 970x120 2

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Microsoft 365 Outage: Thousands of Users Affected Worldwide

A widespread outage of Microsoft 365 services affected thousands of users worldwide on the evening of Wednesday, October 8, 2025,...
Redazione RHC - 9 October 2025

Is your VPN protecting you or spying on you? 800 free VPNs analyzed with disturbing results.

Millions of people use mobile VPNs to hide their traffic, bypass blocks, and browse the web securely. Research by Zimperium...
Redazione RHC - 9 October 2025

Windows 11 now forces you to connect: is offline freedom over?

Microsoft has fixed several bugs that prevented Windows 11 from being installed without internet access or creating a profile on...
Redazione RHC - 9 October 2025

Man with amyotrophic lateral sclerosis controls robotic arm with Neuralink

American Nick Ray , who suffers from amyotrophic lateral sclerosis, described spending three days controlling his robotic arm (ARA) using...
Redazione RHC - 8 October 2025

Wave of attacks against Palo Alto Networks: Over 2,200 IPs involved in the new campaign

Beginning on October 7, 2025, there was a large-scale intensification of targeted attacks against Palo Alto Networks' GlobalProtect access portals,...
Redazione RHC - 8 October 2025

Qualcomm Acquires Arduino to Strengthen Presence in IoT and Robotics

Qualcomm announced on Tuesday the acquisition of Arduino , an Italian company known for producing low-cost programmable printed circuit boards....
Redazione RHC - 8 October 2025

200 car models vulnerable? ‘Killer’ firmware for Flipper Zero surfaces on the darknet.

The topic of hacking and car theft using Flipper Zero has returned to the forefront around the world, and we also talked about it in a recent article. This time,...
Share on Facebook Share on LinkedIn Share on X

“Son, get access to your dad’s smartphone!” Sharp increase in fraud involving minors

F6 has reported a sharp increase in fraud in which criminals exploit minors to access their parents' bank accounts. According to analysts, approximately 3,500 such cases were recorded in the...
Share on Facebook Share on LinkedIn Share on X

Windows 11 Insider Preview: New features and improvements ahead

Microsoft has released a new build 26200.5761 (KB5064093) of Windows 11 Insider Preview to Windows Insiders in the Dev Channel. The update introduces several exciting features and improvements that will...
Share on Facebook Share on LinkedIn Share on X

PoC Zero-Click Exploit on iPhone and Mac: How Two Bytes Can Compromise the Apple Ecosystem

An in-depth analysis and proof-of-concept example has been released regarding CVE-2025-43300, a critical security flaw in Apple's image processing infrastructure that allows remote code execution without the need for a...
Share on Facebook Share on LinkedIn Share on X

Your kidneys for sale on the dark web! The DaVita ransomware attack affects 2.4 million patients

DaVita, an American company that operates a network of over 2,600 hemodialysis centers in the United States, reported a serious loss of patient personal data following a ransomware attack. According...
Share on Facebook Share on LinkedIn Share on X

ChatGPT, will it be your new life companion? Humans are saying goodnight to AI

The artificial intelligence revolution is transforming not only work and productivity, but also personal relationships. More and more users report forming real emotional bonds with chatbots, to the point of...
Share on Facebook Share on LinkedIn Share on X

DeepSeek launches version 3.1 of its AI model with support for Chinese chips

There was a day when DeepSeek surprised half the world by demonstrating that much could be done with less. Today it returns with version 3.1 and a message that doesn't...
Share on Facebook Share on LinkedIn Share on X

Microsoft is investigating an Exchange Online outage affecting the Outlook mobile app

A serious issue with the Exchange Online service, flagged as EX1137017, is currently under investigation by Microsoft. Due to this issue, a number of users are unable to send or...
Share on Facebook Share on LinkedIn Share on X

Can a file name compromise a Linux system? Chinese hackers say so

Researchers at Trellix have discovered an unusual attack pattern on Linux, in which the key element is not an attachment with malicious content, but the name of the file within...
Share on Facebook Share on LinkedIn Share on X

Beware of dissatisfied employees! Four years in prison for bringing his former company to its knees.

A former employee has been convicted of intentionally committing digital sabotage against his employer. Davis Lu, 55, a Chinese citizen living in Houston, was sentenced to four years in prison...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sito
RansomHouse Ransomware Upgraded: Enhanced Encryption Threat
Redazione RHC - 22/12/2025

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…

Immagine del sito
Cyber Attacks on the Rise: Wiper Malware and Data Destruction in 2025
Redazione RHC - 22/12/2025

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers use wipers, destructive tools that…

Immagine del sito
MS13-089 Ransomware: Double Extortion Without Encryption
Inva Malaj - 22/12/2025

MS13-089 opens a leak site on the dark web, exposes the first data and adopts a double extortion strategy without encryption. A brand built on an old Microsoft ID For years, “MS13-089” identified a 2013…

Immagine del sito
Microsoft Shifts Activation Process: What It Means for Air-Gapped Systems
Redazione RHC - 22/12/2025

In the past, many users and system administrators have relied on Microsoft’s telephone activation service to manage installations in specific contexts. During the Windows 8 era, MAK ( Multiple Activation Key) licenses were widely available.…

Immagine del sito
DIG AI: The Dark Web’s New AI Tool for Cybercrime
Redazione RHC - 21/12/2025

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…