Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Ancharia Mobile 1
LECS 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Shai-Hulud Worm Spreads Beyond npm, Attacks Maven
Di Redazione RHC - 28/11/2025

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Immagine del sito
11.7% of jobs could be replaced by artificial intelligence
Di Redazione RHC - 28/11/2025

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Fire Ant Attacks: How a vCenter Bug Opens the Door to IT Hell

Sygnia reports that the initial Fire Ant attack vector, CVE-2023-34048, exploits an out-of-bounds write vulnerability in the vCenter Server implementa...
Redazione RHC - 28/07/2025 - 18:29

Critical vulnerability in WordPress Post SMTP plugin: over 200,000 sites at risk

Over 200,000 WordPress sites are vulnerable to a critical flaw in the popular Post SMTP plugin, allowing attackers to gain full control of the adminis...
Redazione RHC - 28/07/2025 - 15:49

Target: Your Voice! Scattered Spider targets VMware ESXi by cloning employee voices.

The Scattered Spider group has intensified its attacks on corporate IT environments, targeting the VMware ESXi hypervisors of US companies in the reta...
Redazione RHC - 28/07/2025 - 14:47

Supply Chain Attack: Millions of Projects at Risk Due to JavaScript Library Hack

The compromise of a widely used JavaScript library has put millions of projects worldwide at risk. The package in question has been a fundamental, yet...
Redazione RHC - 28/07/2025 - 11:24

BreachForums is back online! 7.3 million posts and 340,000 users restored.

If weeds aren't pulled out by the roots, they'll grow back, much more vigorous than before. This is cybercrime, and this is the new rebirth, the fifth...
Redazione RHC - 28/07/2025 - 08:55

Microsoft Betrayed from Within? Chinese Hackers Exploited SharePoint Bugs Before Patches

Microsoft has launched an internal investigation to determine whether a leak of confidential information from the Microsoft Active Protections Program...
Redazione RHC - 28/07/2025 - 08:31

Fire Ant Attacks: How a vCenter Bug Opens the Door to IT Hell

- July 27th, 2025

Sygnia reports that the initial Fire Ant attack vector, CVE-2023-34048, exploits an out-of-bounds write vulnerability in the vCenter Server implementation of the DCERPC protocol, allowing unauthenticated remote code execution. Security...

Facebook Linkedin X

Critical vulnerability in WordPress Post SMTP plugin: over 200,000 sites at risk

- July 27th, 2025

Over 200,000 WordPress sites are vulnerable to a critical flaw in the popular Post SMTP plugin, allowing attackers to gain full control of the administrator account. The vulnerability has been...

Facebook Linkedin X

Target: Your Voice! Scattered Spider targets VMware ESXi by cloning employee voices.

- July 27th, 2025

The Scattered Spider group has intensified its attacks on corporate IT environments, targeting the VMware ESXi hypervisors of US companies in the retail, transportation, and insurance sectors. These attacks do...

Facebook Linkedin X

Supply Chain Attack: Millions of Projects at Risk Due to JavaScript Library Hack

- July 27th, 2025

The compromise of a widely used JavaScript library has put millions of projects worldwide at risk. The package in question has been a fundamental, yet unnoticed, component of the Node.js...

Facebook Linkedin X

BreachForums is back online! 7.3 million posts and 340,000 users restored.

- July 27th, 2025

If weeds aren't pulled out by the roots, they'll grow back, much more vigorous than before. This is cybercrime, and this is the new rebirth, the fifth ever from the...

Facebook Linkedin X

Microsoft Betrayed from Within? Chinese Hackers Exploited SharePoint Bugs Before Patches

- July 27th, 2025

Microsoft has launched an internal investigation to determine whether a leak of confidential information from the Microsoft Active Protections Program (MAPP) allowed state-sponsored Chinese hackers to exploit serious SharePoint vulnerabilities...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE