Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
UtiliaCS 320x100
2nd Edition GlitchZone RHC 970x120 2

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Microsoft Exchange Server Penetration Testing: Techniques, Tools, and Countermeasures
Di Alessandro Molinari - 06/11/2025

Often, during penetration testing, we find ourselves with elevated access (Domain Admin) within an organization. Some companies stop there, thinking that obtaining Domain Admin is the ultimate goal. B...

Immagine del sito
Notepad++ under attack! How a fake DLL opens the door to criminal hackers
Di Manuel Roccon - 06/11/2025

A new vulnerability affecting Notepad++ was released in September. The vulnerability has been identified as CVE-2025-56383, and details can be found on the NIST website. CVE-2025-56383 is a DLL hijack...

Immagine del sito
A dangerous zero-day zero-click exploit threatens billions of Android devices
Di Redazione RHC - 05/11/2025

Google has issued an urgent advisory regarding a critical vulnerability in Android that allows attackers to execute arbitrary code on the device without any user interaction. The Zero Click vulnerabil...

Immagine del sito
Does Microsoft use macOS to create Windows wallpapers? Probably!
Di Redazione RHC - 04/11/2025

On October 29, Microsoft released a wallpaper to commemorate the eleventh anniversary of the Windows Insider program, and it is speculated that it was created using macOS. Let us remember that Windows...

Immagine del sito
Louvre Theft: Windows 2000 and Windows XP on Networks, as Well as Simple Passwords
Di Redazione RHC - 04/11/2025

As we know, the thieves in the “theft of the century” entered through a second-floor window of the Louvre Museum, but the museum had other problems besides unprotected windows. Although Cu...

China promotes global AI governance under the United Nations

On October 27, the Blue Hall Forum on the theme of "Improving Global Governance and Building a Community with a Shared Future for Humanity" was held a...
Redazione RHC - 27/10/2025 - 13:16

Australia: Microsoft accused of deceptive practices in Microsoft 365 renewals

Australia's competition watchdog, the ACCC, said subscribers to Microsoft 365 Personal and Family plans were being asked to pay higher prices for Copi...
Redazione RHC - 27/10/2025 - 13:01

Criminal Hackers Breach US Nuclear Weapons Production Facilities

Government hackers breached a nuclear weapons component manufacturing facility in the United States by exploiting vulnerabilities in Microsoft SharePo...
Redazione RHC - 27/10/2025 - 11:12

The secret behind Space Invaders’ speed? A technical limitation of the hardware

In 1978, Taito's Space Invaders captivated audiences with its seemingly ingenious gameplay: the more aliens you shot down, the faster the remaining on...
Redazione RHC - 27/10/2025 - 10:37

$2.8 billion in cryptocurrency stolen! Here’s how North Korea circumvents UN sanctions.

Member countries of the international monitoring group MSMT have concluded that North Korea is increasing its use of cybercrime and the remote work of...
Redazione RHC - 27/10/2025 - 09:28

CoPhish is coming! Microsoft Copilot Studio used to steal accounts

Attackers are using an advanced phishing technique, known as CoPhish, that leverages Microsoft Copilot Studio to trick users into granting unauthorize...
Redazione RHC - 27/10/2025 - 07:24
1 14 15 16 17 18 222

China promotes global AI governance under the United Nations

- October 27th, 2025

On October 27, the Blue Hall Forum on the theme of "Improving Global Governance and Building a Community with a Shared Future for Humanity" was held at the Ministry of...

Facebook Linkedin X

Australia: Microsoft accused of deceptive practices in Microsoft 365 renewals

- October 27th, 2025

Australia's competition watchdog, the ACCC, said subscribers to Microsoft 365 Personal and Family plans were being asked to pay higher prices for Copilot or cancel their subscriptions. According to the...

Facebook Linkedin X

Criminal Hackers Breach US Nuclear Weapons Production Facilities

- October 27th, 2025

Government hackers breached a nuclear weapons component manufacturing facility in the United States by exploiting vulnerabilities in Microsoft SharePoint. The incident affected the Kansas City National Security Campus (KCNSC) ,...

Facebook Linkedin X

The secret behind Space Invaders’ speed? A technical limitation of the hardware

- October 27th, 2025

In 1978, Taito's Space Invaders captivated audiences with its seemingly ingenious gameplay: the more aliens you shot down, the faster the remaining ones moved. A crescendo of tension that marked...

Facebook Linkedin X

$2.8 billion in cryptocurrency stolen! Here’s how North Korea circumvents UN sanctions.

- October 27th, 2025

Member countries of the international monitoring group MSMT have concluded that North Korea is increasing its use of cybercrime and the remote work of its citizens abroad to circumvent international...

Facebook Linkedin X

CoPhish is coming! Microsoft Copilot Studio used to steal accounts

- October 27th, 2025

Attackers are using an advanced phishing technique, known as CoPhish, that leverages Microsoft Copilot Studio to trick users into granting unauthorized access to their Microsoft Sign In ID accounts. A...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE