Welcome to Red Hot Cyber | Cybersecurity News
Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
LECS 320x100 1
Fortinet 970x120px

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Top 25 Software Vulnerabilities 2025: MITRE CWE Ranking and Security Tips
Di Redazione RHC - 13/12/2025

MITRE has released its ranking of the 25 most dangerous software vulnerabilities predicted for 2025, based on data collected through the National Vulnerability Database. These vulnerabilities were ide...

Immagine del sito
The Future of Work: 4-Day Week with AI and Tech Advances
Di Redazione RHC - 13/12/2025

The prospect of a four-day workweek, with a resulting three-day long weekend, may not be far off. This is according to Christopher A. Pissarides , a British-Cypriot economist and Nobel Prize winner, w...

Immagine del sito
Kali Linux 2025.4: Discover the Power of Wayland and Enhanced Security Tools
Di Redazione RHC - 12/12/2025

The recent 2025.4 release of Kali Linux has been made available to the public, introducing significant improvements to the GNOME, KDE, and Xfce desktop environments . From now on, Wayland will be the ...

Immagine del sito
IRS.GOV: alleged data breach affects the accounts of 18 million citizens
Di Redazione RHC - 12/12/2025

An alleged database containing sensitive information on 18 million U.S. citizens over 65 has appeared for sale on a popular dark web forum. The advertiser, who uses the pseudonym “Frenshyny,” clai...

Immagine del sito
Microsoft 365 Okta Phishing Attack: Experts Warn of New Threat
Di Redazione RHC - 12/12/2025

A recent study by Datadog Security Labs reveals an ongoing operation targeting organizations using Microsoft 365 and Okta for single sign-on (SSO) authentication. This operation uses sophisticated tec...

150 Malicious Firefox Extensions Stole $1 Million in Cryptocurrency

Koi Security analysts have discovered the GreedyBear malware campaign active in the Mozilla add-on store. 150 malicious Firefox extensions stole over ...
Redazione RHC - 10/08/2025 - 10:19

Over 60s, Under Fire! Hackers Stole $700 Million from Seniors

Americans over 60 lost a staggering $700 million to online fraud in 2024, the highest figure ever recorded by the Federal Trade Commission (FTC). The ...
Redazione RHC - 10/08/2025 - 09:29

EDRs are still going offline! Threats are growing with EDRKillShifter’s offspring.

A new tool for disabling EDR systems has emerged in the cybercriminal community, which Sophos experts believe to be an extension of the EDRKillShifter...
Redazione RHC - 10/08/2025 - 09:18

GPT-5 Hacked in 24 Hours. Experts Find Surprising Weaknesses

After Grok-4 was cracked in two days, GPT-5 was defeated in just 24 hours by the same researchers. Almost simultaneously, the SPLX (formerly SplxAI) t...
Redazione RHC - 09/08/2025 - 17:41

Did you double-click WinRAR? Congratulations! You’ve been compromised

A recently closed WinRAR vulnerability tracked under CVE-2025-8088 was exploited in targeted phishing attacks before the patch was released. The issue...
Redazione RHC - 09/08/2025 - 14:49

Satellites Under Hackers’ Control: “It’s Easier to Hack Them Than to Use Satellite Weapons”

At the Black Hat conference in Las Vegas, VisionSpace Technologies demonstrated that it is much easier and cheaper to disable a satellite or alter its...
Redazione RHC - 09/08/2025 - 11:48

150 Malicious Firefox Extensions Stole $1 Million in Cryptocurrency

- August 9th, 2025

Koi Security analysts have discovered the GreedyBear malware campaign active in the Mozilla add-on store. 150 malicious Firefox extensions stole over $1 million worth of cryptocurrency from users. The fraudulent...

Facebook Linkedin X

Over 60s, Under Fire! Hackers Stole $700 Million from Seniors

- August 9th, 2025

Americans over 60 lost a staggering $700 million to online fraud in 2024, the highest figure ever recorded by the Federal Trade Commission (FTC). The new Consumer Protection Data Spotlight...

Facebook Linkedin X

EDRs are still going offline! Threats are growing with EDRKillShifter’s offspring.

- August 9th, 2025

A new tool for disabling EDR systems has emerged in the cybercriminal community, which Sophos experts believe to be an extension of the EDRKillShifter utility. Its use has already been...

Facebook Linkedin X

GPT-5 Hacked in 24 Hours. Experts Find Surprising Weaknesses

- August 8th, 2025

After Grok-4 was cracked in two days, GPT-5 was defeated in just 24 hours by the same researchers. Almost simultaneously, the SPLX (formerly SplxAI) testing team declared: "GPT-5 is crude...

Facebook Linkedin X

Did you double-click WinRAR? Congratulations! You’ve been compromised

- August 8th, 2025

A recently closed WinRAR vulnerability tracked under CVE-2025-8088 was exploited in targeted phishing attacks before the patch was released. The issue involved directory traversal and was only fixed in WinRAR...

Facebook Linkedin X

Satellites Under Hackers’ Control: “It’s Easier to Hack Them Than to Use Satellite Weapons”

- August 8th, 2025

At the Black Hat conference in Las Vegas, VisionSpace Technologies demonstrated that it is much easier and cheaper to disable a satellite or alter its trajectory than to use anti-satellite...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE