Red Hot Cyber. The Cybersecurity Blog
Palo Alto Networks Also Compromised via Salesforce and Drift
In early September 2025, Palo Alto Networks confirmed it had been the victim of a data breach. The compromise did not affect its core products or services, but rather some internally used Salesforce i...
Was there terror on Ursula von der Leyen’s flight? Let’s clear things up!
On August 31, 2025, flight AAB53G, operated by a Dassault Falcon 900LX registered OO-GPE and carrying European Commission President Ursula von der Leyen, took off from Warsaw and landed safely at Plov...
Zscaler Data Breach: Lessons Learned About the Evolution of SaaS Threats
Zscaler’s recent confirmation of a data breach resulting from a supply chain attack provides a case study in the evolution of threats against complex SaaS ecosystems. The attack, attributed to the APT...
Critical Linux Vulnerability: CVSS 8.5 Vulnerability Discovered in UDisks Daemon
A critical security flaw in the Linux UDisks daemon was recently discovered, allowing potential unprivileged attackers to access files belonging to highly privileged users. The vulnerability, classifi...
Let the hunt begin! Hackers exploit Citrix flaw to infiltrate global systems
A critical zero-day flaw, classified as CVE-2025-6543, has been discovered in Citrix NetScaler systems. This vulnerability has been actively exploited by malicious hackers since May 2025, several mont...
Phishing on Teams: at least the hacker responds faster than the real help desk!
In recent months, as previously reported on Red Hot Cyber, a new front has emerged in the corporate phishing landscape: Microsoft Teams attacks in which attackers impersonate IT or help desk personnel...
Critical vulnerabilities in NetScaler ADC and Gateway. Update now! Attacks are ongoing!
NetScaler has alerted administrators of three new vulnerabilities in NetScaler ADC and NetScaler Gateway, one of which is already being used in active attacks. Updates are available and the vendor urg...
Storm-0501: When Ransomware Moves to the Cloud
Microsoft is raising the alarm: the Storm-0501 cybercriminal group has evolved. No more “traditional” attacks on on-premise machines, no more ransomware that encrypts local files. Now the threat is mo...
Microsoft Teams crashes: Embedded Office documents blocked from opening
A Black Thursday for millions of Microsoft Teams users around the world. A key feature of the collaboration platform – opening embedded Office documents – has suddenly been knocked out, sparking frust...
Happy birthday Windows 95: the system that changed PCs forever!
August 24, 2025, marked the 30th anniversary of the launch of Windows 95, Microsoft’s first mass-market 32-bit consumer operating system, which significantly revolutionized the world of personal compu...
Featured Articles

In early September 2025, Palo Alto Networks confirmed it had been the victim of a data breach. The compromise did not affect its core products or services, but rather some internally used Salesforce i...

On August 31, 2025, flight AAB53G, operated by a Dassault Falcon 900LX registered OO-GPE and carrying European Commission President Ursula von der Leyen, took off from Warsaw and landed safely at Plov...

Zscaler’s recent confirmation of a data breach resulting from a supply chain attack provides a case study in the evolution of threats against complex SaaS ecosystems. The attack, attributed to the A...

A critical security flaw in the Linux UDisks daemon was recently discovered, allowing potential unprivileged attackers to access files belonging to highly privileged users. The vulnerability, classifi...

A critical zero-day flaw, classified as CVE-2025-6543, has been discovered in Citrix NetScaler systems. This vulnerability has been actively exploited by malicious hackers since May 2025, several mont...
Was there terror on Ursula von der Leyen’s flight? Let’s clear things up!
Video Surveillance Under Attack: A Hikvision Bug Allows Admin Access Without a Login
Nearly a third of web traffic is generated by bots! The era of invasive AI is now
Lazarus APT: 3 Advanced RATs for Cryptocurrency Financial Organizations
Zscaler Data Breach: Lessons Learned About the Evolution of SaaS Threats
Zscaler Suffers Data Breach: Supply Chain Attack Via Salesloft Drift

Palo Alto Networks Also Compromised via Salesforce and Drift
Antonio Piazzolla - September 2nd, 2025
In early September 2025, Palo Alto Networks confirmed it had been the victim of a data breach. The compromise did not affect its core products or services, but rather some...

The Battle Between OnlyFans and Google: Piracy, AI, and the Chaos of Automated Copyright
Redazione RHC - September 2nd, 2025
The massive clash between adult content creators and pirates, now transferred to automated copyright protection systems, is beginning to radically change the face of the Internet. Every day, it becomes...

Was there terror on Ursula von der Leyen’s flight? Let’s clear things up!
Giovanni Pollola - September 2nd, 2025
On August 31, 2025, flight AAB53G, operated by a Dassault Falcon 900LX registered OO-GPE and carrying European Commission President Ursula von der Leyen, took off from Warsaw and landed safely...

Video Surveillance Under Attack: A Hikvision Bug Allows Admin Access Without a Login
Antonio Piazzolla - September 2nd, 2025
At the end of August 2025, a high-impact vulnerability affecting HikCentral Professional, the Hikvision platform used to centrally manage video surveillance and access control, was disclosed. The flaw, classified as...
Sign up for the newsletter