Red Hot Cyber. The Cybersecurity Blog
Featured Articles

MITRE has released its ranking of the 25 most dangerous software vulnerabilities predicted for 2025, based on data collected through the National Vulnerability Database. These vulnerabilities were ide...

The prospect of a four-day workweek, with a resulting three-day long weekend, may not be far off. This is according to Christopher A. Pissarides , a British-Cypriot economist and Nobel Prize winner, w...

The recent 2025.4 release of Kali Linux has been made available to the public, introducing significant improvements to the GNOME, KDE, and Xfce desktop environments . From now on, Wayland will be the ...

An alleged database containing sensitive information on 18 million U.S. citizens over 65 has appeared for sale on a popular dark web forum. The advertiser, who uses the pseudonym “Frenshyny,” clai...

A recent study by Datadog Security Labs reveals an ongoing operation targeting organizations using Microsoft 365 and Okta for single sign-on (SSO) authentication. This operation uses sophisticated tec...
As expected, the WinRAR bug has become a devastating weapon for cyber criminals
No Tariffs for 90 Days! China and the US Reach a Temporary Economic Agreement
Toward Skynet: Johns Hopkins University Improves War Simulations with Artificial Intelligence
Microsoft Sued in California for Ending Windows 10 Support
How tablet-wielding monkeys reveal the secrets of our smartphone obsession
Malware Hidden in SVG Images on Adult Sites: A New Trojan Hiding Scheme

As expected, the WinRAR bug has become a devastating weapon for cyber criminals
Redazione RHC - August 11th, 2025
As expected, the infamous WinRAR bug is now being actively exploited by attackers on a large scale, given the software's widespread use and popularity. ESET experts have reported that the...

No Tariffs for 90 Days! China and the US Reach a Temporary Economic Agreement
Redazione RHC - August 11th, 2025
The Government of the People's Republic of China ("China") and the Government of the United States of America ("USA"), according to a report by Beijing-based Xinhua news agency on August...

Toward Skynet: Johns Hopkins University Improves War Simulations with Artificial Intelligence
Redazione RHC - August 11th, 2025
Johns Hopkins University in Maryland is preparing to upgrade its AI-powered wargaming tools to help the Pentagon identify adversaries' weaknesses in real-world conflicts. The work, conducted at the university's Applied...

Microsoft Sued in California for Ending Windows 10 Support
Redazione RHC - August 11th, 2025
A lawsuit has been filed in California against Microsoft, accusing it of prematurely ending support for Windows 10 and forcing users to purchase new devices. The plaintiff, San Diego resident...

How tablet-wielding monkeys reveal the secrets of our smartphone obsession
Redazione RHC - August 11th, 2025
Why can't we tear ourselves away from our screens, even when we've found what we're looking for? Why do we keep mindlessly scrolling through our feeds while time flies by?...

Malware Hidden in SVG Images on Adult Sites: A New Trojan Hiding Scheme
Redazione RHC - August 11th, 2025
A new scheme for distributing malicious code disguised as .svg images has been discovered on dozens of foreign adult content sites. As Malwarebytes experts discovered , attackers embed obfuscated JavaScript...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

