Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Ransomfeed 320x100 1
UtiliaCS 970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
A 0Day bug for a WordPress plugin sold for 6000 euros in the underground
Di Redazione RHC - 13/11/2025

On one of Russia’s most popular forums for buying and selling vulnerabilities and attack tools, the thread appeared as a standard commercial ad, but the content is anything but trivial. The user...

Immagine del sito
Can a cyber attack reduce a country’s GDP? In the UK, it seems so!
Di Redazione RHC - 13/11/2025

The British economy contracted further in September, largely due to the cyber attack on car manufacturer Jaguar Land Rover (JLR) and its forced closure. A new report from the Office for National Stati...

Immagine del sito
The Queen of Cryptocurrency Has Been Captured! She Stole $7 Billion in Bitcoin
Di Redazione RHC - 13/11/2025

A London court has sentenced 47-year-old Chinese woman Zhimin Qian , also known as Yadi Zhang, to 11 years and eight months in prison for laundering bitcoin obtained through the largest cryptocurrency...

Immagine del sito
Salt Typhoon (RedMike): The Chinese Cyber Threat That’s Shaking the World
Di RHC Dark Lab - 12/11/2025

In recent months, the Chinese hacking group known as Salt Typhoon has continued to make headlines for its aggressive and persistent cybersecurity tactics. Despite US sanctions and close government sur...

Immagine del sito
Open WiFi Networks: A Fertile Ground for Cybercrime
Di RedWave Team - 12/11/2025

Nowadays, the proliferation of portable, wearable, and other smart devices has made data exchange, access to resources, and web browsing indispensable. This in-depth look at Wi-Fi focuses on a widely ...

Notepad++ under attack! How a fake DLL opens the door to criminal hackers

A new vulnerability affecting Notepad++ was released in September. The vulnerability has been identified as CVE-2025-56383, and details can be found o...
Manuel Roccon - 06/11/2025 - 06:58

Microsoft warns: Security updates cause problems with BitLocker

Microsoft has issued an urgent warning to Windows operating system users regarding a potential issue that, starting with security updates distributed ...
Redazione RHC - 05/11/2025 - 17:41

A dangerous zero-day zero-click exploit threatens billions of Android devices

Google has issued an urgent advisory regarding a critical vulnerability in Android that allows attackers to execute arbitrary code on the device witho...
Redazione RHC - 05/11/2025 - 16:52

Is the era of paywalls over? Smart browsers circumvent them, and controlling them is very difficult

How can publishers protect themselves from AI-powered "smart" browsers if they look like ordinary users? The emergence of new AI-powered "smart" brows...
Redazione RHC - 05/11/2025 - 16:22

Danger for OneDrive users: Infected DLLs hide in shared files

Attackers are using an advanced technique involving sideloading DLLs via the Microsoft OneDrive application. This allows them to execute malicious cod...
Redazione RHC - 05/11/2025 - 12:26

ArXiv blocks articles generated by AI

arXiv, one of the most important repositories of scientific preprints , has revealed some disturbing facts following growing concerns in the scientifi...
Redazione RHC - 05/11/2025 - 10:02
1 16 17 18 19 20 237

Notepad++ under attack! How a fake DLL opens the door to criminal hackers

- November 6th, 2025

A new vulnerability affecting Notepad++ was released in September. The vulnerability has been identified as CVE-2025-56383, and details can be found on the NIST website. CVE-2025-56383 is a DLL hijacking...

Facebook Linkedin X

Microsoft warns: Security updates cause problems with BitLocker

- November 5th, 2025

Microsoft has issued an urgent warning to Windows operating system users regarding a potential issue that, starting with security updates distributed on October 14, 2025, could cause some devices to...

Facebook Linkedin X

A dangerous zero-day zero-click exploit threatens billions of Android devices

- November 5th, 2025

Google has issued an urgent advisory regarding a critical vulnerability in Android that allows attackers to execute arbitrary code on the device without any user interaction. The Zero Click vulnerability...

Facebook Linkedin X

Is the era of paywalls over? Smart browsers circumvent them, and controlling them is very difficult

- November 5th, 2025

How can publishers protect themselves from AI-powered "smart" browsers if they look like ordinary users? The emergence of new AI-powered "smart" browsers is challenging traditional methods of protecting online content....

Facebook Linkedin X

Danger for OneDrive users: Infected DLLs hide in shared files

- November 5th, 2025

Attackers are using an advanced technique involving sideloading DLLs via the Microsoft OneDrive application. This allows them to execute malicious code undetected by security mechanisms. The attack uses a modified...

Facebook Linkedin X

ArXiv blocks articles generated by AI

- November 5th, 2025

arXiv, one of the most important repositories of scientific preprints , has revealed some disturbing facts following growing concerns in the scientific community regarding the uncontrolled use of generative artificial...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE