Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320×100
2nd Edition GlitchZone RHC 970x120 2

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Nvidia CEO: “The gap with China is just a few nanoseconds.”

On September 25, during the interview program Bg2 Pod , Nvidia CEO Jen-Hsun Huang expressed positions that fueled heated public...
Redazione RHC - 30 September 2025

Microsoft launches Agent Mode in Excel and Word! Fewer formulas and more artificial intelligence.

Microsoft has launched Agent Mode, an AI-powered feature in Excel and Word that automatically creates complex spreadsheets and text documents...
Redazione RHC - 30 September 2025

Goodbye, real-life stars? Here comes Tilly Norwood, the first AI actress!

In an industry once dominated by live-action stars, digital characters are increasingly gaining traction. At a summit in Zurich, actress,...
Redazione RHC - 30 September 2025

LockBit 5.0 — the cross-platform ransomware that targets hypervisors

In September 2025, a new incarnation of the notorious LockBit ransomware emerged, dubbed LockBit 5.0. It's not just an "update":...
Antonio Piazzolla - 30 September 2025

From user to root in a second! CISA warns: millions of operating systems at risk. Patch!

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability in the popular Sudo utility, used on...
Redazione RHC - 30 September 2025

HarmonyOS: 1 billion devices and a growing open-source ecosystem

The Open Source Hongmeng Technology Conference 2025, recently held in Changsha, highlighted the achievements of HarmonyOS " Hongmeng " (鸿蒙),...
Redazione RHC - 30 September 2025

What are ransomware gang data leak sites?

Ransomware gang data leak sites (DLSs) pose an increasingly widespread threat to businesses and individuals using the internet. These sites were created by cyber gangs to publish data stolen during...
Share on Facebook Share on LinkedIn Share on X

Discovering the Deep Web and Dark Web: The Ultimate Guide

There has been a lot of talk for some years now about the deep web and the dark web, and many have wondered: but what exactly does this mean? The...
Share on Facebook Share on LinkedIn Share on X

Artificial intelligence will overwhelm us! The warning from a former Google executive is a dystopian future.

A former Google executive is sounding the alarm: artificial intelligence is poised to displace workers and drag us toward a dystopia. Mo Gawdat, a former Google executive, is sounding the...
Share on Facebook Share on LinkedIn Share on X

Grok in “hot” mode! Create adult videos with Elon Musk’s AI

Elon Musk's AI company, xAI, recently introduced a provocative feature to its Grok Imagine tool: "Spicy Mode." This addition allows users to generate NSFW images and videos, marking a clear...
Share on Facebook Share on LinkedIn Share on X

Google Hacked by ShinyHunters Cybergang. Customer Database Information Stolen

No IT giant can consider itself safe from cybercrime threats. We've seen these types of problems at Red Hot Cyber. For example, major companies like Microsoft and Apple have been...
Share on Facebook Share on LinkedIn Share on X

GitHub CEO: Programmers Who Don’t Embrace AI Will Be Done

The common message from software development giants is this: Programming is transforming from manual labor to managing digital agents. GitHub CEO Thomas Domke has issued a stern warning to the...
Share on Facebook Share on LinkedIn Share on X

GPT-OSS is released: OpenAI’s new open-source model that works without an internet connection

This week, OpenAI unveiled a long-awaited open language model called gpt-oss. Its key selling point is the ability to run locally on your computer, including Macs with Apple Silicon processors....
Share on Facebook Share on LinkedIn Share on X

New Critical Vulnerability Discovered in Microsoft Exchange Server: CISA Warns

A critical security flaw has been discovered in hybrid deployments of Microsoft Exchange Server. This vulnerability (CWE-287) allows attackers with local administrative access to escalate their privileges within cloud environments....
Share on Facebook Share on LinkedIn Share on X

Artificial Intelligence Doesn’t Reduce Costs, It Increases Them! From Silicon Valley, the New Reality

The wave of layoffs in Silicon Valley continues in 2025. Silicon Valley CEOs are shouting that artificial intelligence will bring a new revolution in efficiency and will also be the...
Share on Facebook Share on LinkedIn Share on X

Two Android Vulnerabilities Actively Exploited: Google Releases Critical Patches

Google has released the August security updates for Android, which contain patches for six vulnerabilities. Two of these are related to Qualcomm components and have already been exploited in targeted...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sito
La Poste Hit by Pro-Russian DDoS Attack During Peak Holiday Season
Redazione RHC - 23/12/2025

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…

Immagine del sito
CVE-2025-47761: FortiClient VPN Zero-Day Exploit Lets Privilege Escalation
Manuel Roccon - 23/12/2025

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…

Immagine del sito
Critical MongoDB Vulnerability Exposed: CVE-2025-14847
Redazione RHC - 23/12/2025

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…

Immagine del sito
RansomHouse Ransomware Upgraded: Enhanced Encryption Threat
Redazione RHC - 22/12/2025

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…

Immagine del sito
Cyber Attacks on the Rise: Wiper Malware and Data Destruction in 2025
Redazione RHC - 22/12/2025

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers use wipers, destructive tools that…