Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Crowdstrike 320×100
Banner Ransomfeed 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

ChatGPT becomes a social media platform: private messaging is coming soon.

OpenAI appears to be preparing ChatGPT to become a social platform, not just a traditional AI-powered chat app. The company...
Redazione RHC - 6 October 2025

25,000 kilometers, the new Seacom2.0 submarine cable to connect Europe, Africa and Asia

Seacom, an African submarine infrastructure operator, has announced the launch of Seacom 2.0 , an international cable system designed to...
Redazione RHC - 6 October 2025

DeepSeek challenges AI giants: 50% cost and API cuts

The Chinese company DeepSeek has presented an experimental version of its language model, DeepSeek-V3.2-Exp, which for the first time implements...
Redazione RHC - 6 October 2025

Oracle E-Business Suite 9.8 Vulnerability: Urgent Updates Needed

Oracle has published a security advisory regarding a critical vulnerability identified as CVE-2025-61882 in the Oracle E-Business Suite . The...
Redazione RHC - 5 October 2025

iPad with M5 chip spotted: Promising performance on Geekbench

An unknown iPad with an M5 chip has been spotted on Geekbench . The device scored 4,133 in the single-core...
Redazione RHC - 5 October 2025

China launches underwater data center to reduce carbon footprint

China is preparing to launch one of the first commercial underwater data center projects . In mid-October, a capsule containing...
Redazione RHC - 5 October 2025

OT Under Fire! CISA Releases Critical Asset Inventory Guide

CISA, in collaboration with international partners, has published a comprehensive guide, titled "OT Cybersecurity Fundamentals: Asset Inventory Guide for Owners and Operators," to strengthen cybersecurity defenses in critical infrastructure sectors....
Share on Facebook Share on LinkedIn Share on X

The MadeYouReset vulnerability in HTTP/2 can be exploited in powerful DDoS attacks

A vulnerability called MadeYouReset has been discovered in several HTTP/2 implementations. This vulnerability can be exploited to launch powerful DDoS attacks. Researchers at Imperva, Deepness Lab, and Tel Aviv University...
Share on Facebook Share on LinkedIn Share on X

Microsoft: $250 million in salaries for AI talent

According to inside sources and internal documents seen by Business Insider, the software giant has compiled a list of its most sought-after engineers and researchers and is launching a new...
Share on Facebook Share on LinkedIn Share on X

RIP Microsoft PowerShell 2.0! The end of an era is coming between August and September

Microsoft will remove PowerShell 2.0 from Windows starting in August, years after announcing its deprecation and keeping it as an optional feature. The 14-year-old command processor introduced with Windows 7...
Share on Facebook Share on LinkedIn Share on X

SQLite, Nginx, and Apache collapse in a day. Will hackers and AI agents revolutionize bug hunting?

Developing AI agents capable of identifying vulnerabilities in complex systems is still a challenging task that requires a lot of manual labor. However, these agents offer a major advantage: unlike...
Share on Facebook Share on LinkedIn Share on X

The KING of passwords is getting a makeover! Hashcat 7.0.0 is here: refactoring is out!

The Hashcat team has released a major update to its password guessing tool, version 7.0.0. This is the first major release in over two years and includes hundreds of fixes,...
Share on Facebook Share on LinkedIn Share on X

The world’s first robotic womb arrives: will an android give birth to babies by 2026?

Chinese company Kaiwa Technology, based in Guangzhou, has announced its intention to create the world's first "robotic womb" by 2026: a humanoid machine with an artificial womb in its abdomen...
Share on Facebook Share on LinkedIn Share on X

Microsoft Teams Under Increasingly Under Fire. EncryptHub Compromised Corporate Networks with Malware

In recent years, Microsoft Teams has become one of the most popular collaboration tools within companies, transforming into a strategic channel not only for communication but also for managing documents,...
Share on Facebook Share on LinkedIn Share on X

A critical vulnerability has been discovered in Microsoft Web Deploy

A Microsoft Web Deploy tool has a critical security flaw that could be exploited by authenticated attackers to execute code on affected systems. This is the bug tracked under CVE-2025-53772,...
Share on Facebook Share on LinkedIn Share on X

Is Artificial Intelligence Aiming to Eliminate the Middle Class?

On August 5, Fast Technology reported that, according to media reports, Mo Gawdat, former chief commercial officer at Google X warned that artificial intelligence (AI) will replace most workers in...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sito
RansomHouse Ransomware Upgraded: Enhanced Encryption Threat
Redazione RHC - 22/12/2025

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…

Immagine del sito
Cyber Attacks on the Rise: Wiper Malware and Data Destruction in 2025
Redazione RHC - 22/12/2025

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers use wipers, destructive tools that…

Immagine del sito
MS13-089 Ransomware: Double Extortion Without Encryption
Inva Malaj - 22/12/2025

MS13-089 opens a leak site on the dark web, exposes the first data and adopts a double extortion strategy without encryption. A brand built on an old Microsoft ID For years, “MS13-089” identified a 2013…

Immagine del sito
Microsoft Shifts Activation Process: What It Means for Air-Gapped Systems
Redazione RHC - 22/12/2025

In the past, many users and system administrators have relied on Microsoft’s telephone activation service to manage installations in specific contexts. During the Windows 8 era, MAK ( Multiple Activation Key) licenses were widely available.…

Immagine del sito
DIG AI: The Dark Web’s New AI Tool for Cybercrime
Redazione RHC - 21/12/2025

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…