Red Hot Cyber. The Cybersecurity Blog
Featured Articles

This fall, we’ve had quite a bit of a cloud headache, I don’t know if you’ve noticed. That is, AWS, Azure , and then Cloudflare . All of them down, one after the other. A series of outages that ...

Users noticed that last week Microsoft developers disabled the offline activation method for Windows 11 and 10 via KMS38, which has been used by hackers around the world for years. However, the offici...

Group-IB experts presented a detailed analysis of the long-running UNC2891 campaign, which demonstrated the continuing sophistication of ATM attack schemes. Attention focused on the Raspberry Pi, whic...

Israeli company NSO Group has appealed a California federal court ruling that bars it from using WhatsApp’s infrastructure to distribute its Pegasus surveillance software. The case, which has been o...

A vulnerability, designated CVE-2025-61757, was made public by Searchlight Cyber last Thursday. Company researchers discovered the issue and notified Oracle, which led to its disclosure. Oracle fixed ...
Taiwan launches international initiative for submarine cable safety
Port scanning in 2025: Nmap and AI — how to integrate them securely and operationally
The Louvre Theft: When Thieves Taught the World the Physical Pen Test
Starting November 12th, age verification for porn sites will be implemented in Italy. What’s changing?
AzureHound: The “Legitimate” Tool for Cloud Attacks
Red Hot Cyber launches free real-time CVE Enrichment service

Taiwan launches international initiative for submarine cable safety
Redazione RHC - November 1st, 2025
On October 28, 2025, during the Taiwan-EU Submarine Cable Safety Cooperation Forum held in Taipei, Taiwanese Foreign Minister Lin Chia-lung introduced the "International Initiative for Submarine Cable Risk Management" ,...

Port scanning in 2025: Nmap and AI — how to integrate them securely and operationally
Luca Stivali - November 1st, 2025
In 2025, port scanning remains a key activity for both Red Teams (reconnaissance, discovery, fingerprinting) and Blue Teams (monitoring and proactive defense). But the latest development is the arrival of...

The Louvre Theft: When Thieves Taught the World the Physical Pen Test
Luca Errico - November 1st, 2025
The event that shook the world on October 19, 2025, was not a natural disaster or a financial collapse, but the sensational theft of Napoleon's jewels from the Louvre Museum....

Starting November 12th, age verification for porn sites will be implemented in Italy. What’s changing?
Redazione RHC - October 31st, 2025
Starting Tuesday, November 12, 2025, new provisions from the Italian Communications Regulatory Authority (AGCOM) will come into force, requiring an age verification system for accessing pornographic websites. The measure, provided...

AzureHound: The “Legitimate” Tool for Cloud Attacks
Luca Galuppi - October 31st, 2025
AzureHound, part of the BloodHound suite, was born as an open-source tool to help security teams and red teams identify vulnerabilities and escalation paths in Microsoft Azure and Entra ID...

Red Hot Cyber launches free real-time CVE Enrichment service
Redazione RHC - October 31st, 2025
Timeliness is key in cybersecurity. Red Hot Cyber recently launched a completely free service that allows IT professionals, security analysts, and enthusiasts to monitor the most critical vulnerabilities published in...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

