Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
UtiliaCS 320x100
Banner Ransomfeed 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Telegram opens an artificial intelligence lab in Kazakhstan

Telegram founder Pavel Durov announced the opening of a new artificial intelligence lab in Kazakhstan . The announcement was made...
Redazione RHC - 3 October 2025

CISA Alert: Sudo Bug Affects Linux and Unix! Urgent Action Required by October 20th

The Cyberspace and Infrastructure Security Center (CISA) recently added the critical vulnerability in the Sudo utility to its Actively Exploited...
Redazione RHC - 3 October 2025

Work and artificial intelligence: rising salaries for those who use AI?

The debate over artificial intelligence applied to the world of work is currently intensifying, a clear sign of how digital...
Redazione RHC - 3 October 2025

And the drones are going to hell! The anti-drone technology developed by the USA

The American company Epirus has provided an impressive demonstration of its Leonidas microwave defense system, designed to combat drones. At...
Redazione RHC - 3 October 2025

Microsoft goes all out with shoes! They’ve launched collectible Windows XP-themed Crocs

This year, Microsoft celebrates its first 50 years, a milestone that reflects the company's transformation from a small startup in...
Redazione RHC - 2 October 2025

The future of submarine cables: 48% longer by 2040. Are we really ready?

The undersea cables connecting the UK to the outside world are vital to the country, with transactions amounting to £220...
Redazione RHC - 2 October 2025

29,000 Exchange servers at risk. The exploit for CVE-2025-53786 is under exploitation.

29,000 Exchange servers are vulnerable to CVE-2025-53786, which allows attackers to move within Microsoft cloud environments, potentially leading to complete domain compromise. CVE-2025-53786 allows attackers who have already gained administrative...
Share on Facebook Share on LinkedIn Share on X

Vulnerability in a car dealership’s online login system: Researcher finds security flaws

A vulnerability was discovered in the online dealership login system of one of the world's largest automakers—all it took was a little digging into the page's code. Security researcher Eaton...
Share on Facebook Share on LinkedIn Share on X

Vulnerability in car dealership online login system: Researcher finds security flaws

A vulnerability has been discovered in the online login system for dealerships at one of the world's largest car manufacturers: all it took was a little digging into the page's...
Share on Facebook Share on LinkedIn Share on X

As expected, the WinRAR bug has become a devastating weapon for cyber criminals

As expected, the infamous WinRAR bug is now being actively exploited by attackers on a large scale, given the software's widespread use and popularity. ESET experts have reported that the...
Share on Facebook Share on LinkedIn Share on X

No Tariffs for 90 Days! China and the US Reach a Temporary Economic Agreement

The Government of the People's Republic of China ("China") and the Government of the United States of America ("USA"), according to a report by Beijing-based Xinhua news agency on August...
Share on Facebook Share on LinkedIn Share on X

Toward Skynet: Johns Hopkins University Improves War Simulations with Artificial Intelligence

Johns Hopkins University in Maryland is preparing to upgrade its AI-powered wargaming tools to help the Pentagon identify adversaries' weaknesses in real-world conflicts. The work, conducted at the university's Applied...
Share on Facebook Share on LinkedIn Share on X

Microsoft Sued in California for Ending Windows 10 Support

A lawsuit has been filed in California against Microsoft, accusing it of prematurely ending support for Windows 10 and forcing users to purchase new devices. The plaintiff, San Diego resident...
Share on Facebook Share on LinkedIn Share on X

How tablet-wielding monkeys reveal the secrets of our smartphone obsession

Why can't we tear ourselves away from our screens, even when we've found what we're looking for? Why do we keep mindlessly scrolling through our feeds while time flies by?...
Share on Facebook Share on LinkedIn Share on X

Malware Hidden in SVG Images on Adult Sites: A New Trojan Hiding Scheme

A new scheme for distributing malicious code disguised as .svg images has been discovered on dozens of foreign adult content sites. As Malwarebytes experts discovered , attackers embed obfuscated JavaScript...
Share on Facebook Share on LinkedIn Share on X

China is focusing on humanoid robots! A package of measures is coming for 10,000 units by 2027.

Beijing announced a package of support measures for humanoid robots at the World Robot Conference (WRC) 2025, aiming to reach an annual production capacity of 10,000 units by 2027. The...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sito
CVE-2025-47761: FortiClient VPN Zero-Day Exploit Lets Privilege Escalation
Manuel Roccon - 23/12/2025

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…

Immagine del sito
Critical MongoDB Vulnerability Exposed: CVE-2025-14847
Redazione RHC - 23/12/2025

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…

Immagine del sito
RansomHouse Ransomware Upgraded: Enhanced Encryption Threat
Redazione RHC - 22/12/2025

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…

Immagine del sito
Cyber Attacks on the Rise: Wiper Malware and Data Destruction in 2025
Redazione RHC - 22/12/2025

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers use wipers, destructive tools that…

Immagine del sito
MS13-089 Ransomware: Double Extortion Without Encryption
Inva Malaj - 22/12/2025

MS13-089 opens a leak site on the dark web, exposes the first data and adopts a double extortion strategy without encryption. A brand built on an old Microsoft ID For years, “MS13-089” identified a 2013…