Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
2nd Edition GlitchZone RHC 320x100 2
2nd Edition GlitchZone RHC 970x120 2

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

LockBit 5.0 — the cross-platform ransomware that targets hypervisors

In September 2025, a new incarnation of the notorious LockBit ransomware emerged, dubbed LockBit 5.0. It's not just an "update":...
Antonio Piazzolla - 30 September 2025

From user to root in a second! CISA warns: millions of operating systems at risk. Patch!

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability in the popular Sudo utility, used on...
Redazione RHC - 30 September 2025

HarmonyOS: 1 billion devices and a growing open-source ecosystem

The Open Source Hongmeng Technology Conference 2025, recently held in Changsha, highlighted the achievements of HarmonyOS " Hongmeng " (鸿蒙),...
Redazione RHC - 30 September 2025

Back to the On-Prem: Austrian Armed Forces Choose LibreOffice

In recent years, many companies have gone cloud-first , outsourcing critical infrastructure and business services to platforms managed by external...
Redazione RHC - 30 September 2025

Digital Crisis Management: Communication Is the Key to Success or Failure

In recent years, cyberattacks have become a major threat to businesses, regardless of industry. While technical departments focus on troubleshooting...
Redazione RHC - 30 September 2025

A joke extension and Chat Control crashes! Houston, we have a problem… with privacy

In 2025, the European Union wants full control over private chats. The “Chat Control” regulation (proposal COM(2022)209) claims to fight...
Sergio Corpettini - 30 September 2025

New Critical Vulnerability Discovered in Microsoft Exchange Server: CISA Warns

A critical security flaw has been discovered in hybrid deployments of Microsoft Exchange Server. This vulnerability (CWE-287) allows attackers with local administrative access to escalate their privileges within cloud environments....
Share on Facebook Share on LinkedIn Share on X

Artificial Intelligence Doesn’t Reduce Costs, It Increases Them! From Silicon Valley, the New Reality

The wave of layoffs in Silicon Valley continues in 2025. Silicon Valley CEOs are shouting that artificial intelligence will bring a new revolution in efficiency and will also be the...
Share on Facebook Share on LinkedIn Share on X

Two Android Vulnerabilities Actively Exploited: Google Releases Critical Patches

Google has released the August security updates for Android, which contain patches for six vulnerabilities. Two of these are related to Qualcomm components and have already been exploited in targeted...
Share on Facebook Share on LinkedIn Share on X

Adobe Experience Manager Forms under attack! Urgent patch for a score 10 RCE zero-day bug.

On August 5, 2025, Adobe released an urgent security update for Adobe Experience Manager (AEM) Forms on Java Enterprise Edition (JEE), addressing two serious vulnerabilities: CVE-2025-54253 and CVE-2025-54254. The most...
Share on Facebook Share on LinkedIn Share on X

A Year of Silence! Plague Discovered, the Linux Malware No One Had Seen

Researchers at Nextron Systems have discovered a new Linux malware that went undetected for over a year. It allows attackers to gain persistent SSH access and bypass authentication on compromised...
Share on Facebook Share on LinkedIn Share on X

Microsoft launches a $5 million bug hunt! And the war on zero-days begins!

The global cybersecurity industry is gearing up for a new challenge: Microsoft is launching an updated Zero Day Quest initiative, promising previously fantastic rewards: the total prize pool has reached...
Share on Facebook Share on LinkedIn Share on X

D-Link cameras under attack! Hackers are still exploiting vulnerabilities from 2020. CISA warns.

Recently, cybercriminals have refocused on old vulnerabilities in popular D-Link Wi-Fi cameras and DVRs. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has officially added three dangerous vulnerabilities to its...
Share on Facebook Share on LinkedIn Share on X

The Monte Carlo Casino wrote to RHC: “At this stage, no intrusion has been detected.”

Red Hot Cyber has received and is sharing with its readers the official statement from Monte-Carlo Société des Bains de Mer, the famous Monte Carlo casino, regarding a recent episode...
Share on Facebook Share on LinkedIn Share on X

Digital Decay: When the Promised Future Becomes a Cage

For decades, we have celebrated digital as the promise of a more connected, efficient, and democratic future. But today, looking around, a subtle and disturbing question arises: What if we...
Share on Facebook Share on LinkedIn Share on X

PlayReady Certificate Leak Forces Microsoft to Step In to Protect Streaming

With so many options for streaming video online, content protection continues to be a key concern for copyright holders. This is often achieved through digital rights management (DRM) anti-piracy tools,...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sito
La Poste Hit by Pro-Russian DDoS Attack During Peak Holiday Season
Redazione RHC - 23/12/2025

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…

Immagine del sito
CVE-2025-47761: FortiClient VPN Zero-Day Exploit Lets Privilege Escalation
Manuel Roccon - 23/12/2025

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…

Immagine del sito
Critical MongoDB Vulnerability Exposed: CVE-2025-14847
Redazione RHC - 23/12/2025

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…

Immagine del sito
RansomHouse Ransomware Upgraded: Enhanced Encryption Threat
Redazione RHC - 22/12/2025

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…

Immagine del sito
Cyber Attacks on the Rise: Wiper Malware and Data Destruction in 2025
Redazione RHC - 22/12/2025

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers use wipers, destructive tools that…