Red Hot Cyber. The Cybersecurity Blog
Featured Articles

A new version, 8.8.9, of the popular text editor Notepad++, has been released by its developers, fixing a flaw in the automatic update system . This issue came to light after some users and investigat...

A recent study by SentinelLabs sheds new light on the roots of the hacker group known as “Salt Typhoon ,” which carried out one of the most audacious espionage operations of the past decade. First...

Shannon acts as a penetration tester who doesn’t just report vulnerabilities, but launches actual exploits. Shannon’s goal is to breach your web application’s security before anyone with malicio...

The scene is always the same: monitors lit, dashboards full of alerts, logs scrolling too quickly, an anxious customer on the other end of the call. You sit down, look around, and realize that, once a...

A well-known initial access broker (IAB) called ” Storm-0249 ” has changed its operational strategies, using phishing campaigns as well as highly targeted attacks, which exploit the very security ...
Critical React Server Vulnerability: Update Now to Prevent RCE Attacks
Critical Vulnerability in King Addons for Elementor Exploited
Google Discover AI Headlines: Revolutionizing News Feed or Clickbait Nightmare?
Storm-0900 Phishing Campaign Spreads XWorm Malware
Windows 10 Still Running on 1 Billion PCs, Upgrade to Windows 11 Urged
Secure AI Integration in OT Systems: Key Principles and Best Practices

Critical React Server Vulnerability: Update Now to Prevent RCE Attacks
Redazione RHC - December 3rd, 2025
Developers and administrators around the world are urgently updating their servers following the discovery of a critical vulnerability in React Server, which allows attackers to remotely execute unauthenticated code with...

Critical Vulnerability in King Addons for Elementor Exploited
Redazione RHC - December 3rd, 2025
During the registration process, a critical security flaw (CVE-2025-8489) in the King Addons WordPress Elementor plugin was exploited by attackers, allowing them to gain administrative privileges via a privilege escalation...

Google Discover AI Headlines: Revolutionizing News Feed or Clickbait Nightmare?
Redazione RHC - December 3rd, 2025
Google is testing AI-generated headlines in its Discover feed, replacing original news headlines with original ones. Sean Hollister, editor-in-chief of The Verge, reported this , noting that short and often...

Storm-0900 Phishing Campaign Spreads XWorm Malware
Redazione RHC - December 3rd, 2025
Over the holiday season, a coordinated attack was detected and blocked by Microsoft Threat Intelligence security analysts, involving tens of thousands of emails crafted to deceive recipients. The cybercriminal group...

Windows 10 Still Running on 1 Billion PCs, Upgrade to Windows 11 Urged
Redazione RHC - December 3rd, 2025
Windows 10 has been officially retired, but it still runs on approximately one billion personal computers worldwide. A significant number of devices are technically ready to upgrade to Windows 11,...

Secure AI Integration in OT Systems: Key Principles and Best Practices
Redazione RHC - December 3rd, 2025
Since ChatGPT's public release in November 2022, artificial intelligence (AI) has been integrated into many aspects of human society. For owners and operators of critical infrastructure, AI can be used...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

