Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Enterprise BusinessLog 320x200 1
Fortinet 970x120px

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Cyberattack on Eurofiber France: Find out what happened
Di Redazione RHC - 24/11/2025

On November 13, Eurofiber France, a respected provider of fiber optic network and VPN solutions to many of France’s leading companies, discovered that its systems had been compromised by criminal ha...

Immagine del sito
When the Cloud Falls: How a Small Mistake Brought the Global Internet to Its Knees
Di Gaia Russo - 24/11/2025

This fall, we’ve had quite a bit of a cloud headache, I don’t know if you’ve noticed. That is, AWS, Azure , and then Cloudflare . All of them down, one after the other. A series of outages that ...

Immagine del sito
Microsoft Blocks KMS38 Activation Method for Windows 10 and 11
Di Redazione RHC - 23/11/2025

Users noticed that last week Microsoft developers disabled the offline activation method for Windows 11 and 10 via KMS38, which has been used by hackers around the world for years. However, the offici...

Immagine del sito
ATMs targeted! Cybersecurity experts reveal an attack campaign targeting ATMs.
Di Redazione RHC - 23/11/2025

Group-IB experts presented a detailed analysis of the long-running UNC2891 campaign, which demonstrated the continuing sophistication of ATM attack schemes. Attention focused on the Raspberry Pi, whic...

Immagine del sito
“We Want to Hack You Again!” NSO Group Rejects WhatsApp’s Pegasus Lawsuit
Di Redazione RHC - 22/11/2025

Israeli company NSO Group has appealed a California federal court ruling that bars it from using WhatsApp’s infrastructure to distribute its Pegasus surveillance software. The case, which has been o...

Cyberattacks against public applications are increasing. Cisco’s report

Milan, November 4, 2025 - Cyberattacks that exploit publicly accessible applications, such as websites or corporate portals, to gain access to organiz...
Redazione RHC - 06/11/2025 - 11:22

Epic vs. Google: Historic Agreement for App Developers

Just when it seemed like Epic's case against Google was on the verge of a final victory for the developer —following the potential dismissal of Google...
Redazione RHC - 06/11/2025 - 10:00

Undersea Cables, the New Hybrid War: Jaroslav Nad’s Alarm

Taiwan is critically dependent on its undersea infrastructure, which is essential for communications and power supply . In recent years, however, ther...
Redazione RHC - 06/11/2025 - 07:33

Apache OpenOffice under ransomware attack, but the foundation disputes

The Apache OpenOffice project has come under scrutiny after the Akira ransomware group claimed to have carried out a cyberattack and stolen 23 gigabyt...
Redazione RHC - 06/11/2025 - 07:10

Microsoft Exchange Server Penetration Testing: Techniques, Tools, and Countermeasures

Often, during penetration testing, we find ourselves with elevated access (Domain Admin) within an organization. Some companies stop there, thinking t...
Alessandro Molinari - 06/11/2025 - 07:03

Notepad++ under attack! How a fake DLL opens the door to criminal hackers

A new vulnerability affecting Notepad++ was released in September. The vulnerability has been identified as CVE-2025-56383, and details can be found o...
Manuel Roccon - 06/11/2025 - 06:58
1 30 31 32 33 34 252

Cyberattacks against public applications are increasing. Cisco’s report

- November 6th, 2025

Milan, November 4, 2025 - Cyberattacks that exploit publicly accessible applications, such as websites or corporate portals, to gain access to organizational systems are on the rise, and phishing attacks...

Facebook Linkedin X

Epic vs. Google: Historic Agreement for App Developers

- November 6th, 2025

Just when it seemed like Epic's case against Google was on the verge of a final victory for the developer —following the potential dismissal of Google's appeal by the Supreme...

Facebook Linkedin X

Undersea Cables, the New Hybrid War: Jaroslav Nad’s Alarm

- November 6th, 2025

Taiwan is critically dependent on its undersea infrastructure, which is essential for communications and power supply . In recent years, however, there have been a series of incidents of damage...

Facebook Linkedin X

Apache OpenOffice under ransomware attack, but the foundation disputes

- November 6th, 2025

The Apache OpenOffice project has come under scrutiny after the Akira ransomware group claimed to have carried out a cyberattack and stolen 23 gigabytes of internal data. However, the organization...

Facebook Linkedin X

Microsoft Exchange Server Penetration Testing: Techniques, Tools, and Countermeasures

- November 6th, 2025

Often, during penetration testing, we find ourselves with elevated access (Domain Admin) within an organization. Some companies stop there, thinking that obtaining Domain Admin is the ultimate goal. But it's...

Facebook Linkedin X

Notepad++ under attack! How a fake DLL opens the door to criminal hackers

- November 6th, 2025

A new vulnerability affecting Notepad++ was released in September. The vulnerability has been identified as CVE-2025-56383, and details can be found on the NIST website. CVE-2025-56383 is a DLL hijacking...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE