Welcome to Red Hot Cyber | Cybersecurity News
Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
UtiliaCS 320x100
970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Top 25 Software Vulnerabilities 2025: MITRE CWE Ranking and Security Tips
Di Redazione RHC - 13/12/2025

MITRE has released its ranking of the 25 most dangerous software vulnerabilities predicted for 2025, based on data collected through the National Vulnerability Database. These vulnerabilities were ide...

Immagine del sito
The Future of Work: 4-Day Week with AI and Tech Advances
Di Redazione RHC - 13/12/2025

The prospect of a four-day workweek, with a resulting three-day long weekend, may not be far off. This is according to Christopher A. Pissarides , a British-Cypriot economist and Nobel Prize winner, w...

Immagine del sito
Kali Linux 2025.4: Discover the Power of Wayland and Enhanced Security Tools
Di Redazione RHC - 12/12/2025

The recent 2025.4 release of Kali Linux has been made available to the public, introducing significant improvements to the GNOME, KDE, and Xfce desktop environments . From now on, Wayland will be the ...

Immagine del sito
IRS.GOV: alleged data breach affects the accounts of 18 million citizens
Di Redazione RHC - 12/12/2025

An alleged database containing sensitive information on 18 million U.S. citizens over 65 has appeared for sale on a popular dark web forum. The advertiser, who uses the pseudonym “Frenshyny,” clai...

Immagine del sito
Microsoft 365 Okta Phishing Attack: Experts Warn of New Threat
Di Redazione RHC - 12/12/2025

A recent study by Datadog Security Labs reveals an ongoing operation targeting organizations using Microsoft 365 and Okta for single sign-on (SSO) authentication. This operation uses sophisticated tec...

Google Chrome Urgent Update Fixes Zero-Day Vulnerability

An urgent update has been released by Google for the stable version of the Desktop browser, in order to address an extremely serious vulnerability tha...
Redazione RHC - 11/12/2025 - 07:19

EtherRAT Malware Exploits React2Shell Vulnerability with Ethereum C2

Just two days after the critical React2Shell vulnerability was discovered, Sysdig researchers discovered a new malware, EtherRAT, in a compromised Nex...
Redazione RHC - 11/12/2025 - 07:13

Is QDay approaching? QuantWare presents its 10,000-qubit quantum processor

The world of quantum technology has made an impressive leap forward: QuantWare has unveiled the world's first 10,000-qubit processor, 100 times more t...
Redazione RHC - 10/12/2025 - 19:22

Ivanti Endpoint Manager Vulnerabilities: Update Now to Prevent RCE

Ivanti has released an urgent update for its Endpoint Manager (EPM) platform, addressing a set of significant vulnerabilities that could allow attacke...
Redazione RHC - 10/12/2025 - 15:59

Malicious VSCode Extensions Steal Crypto Wallets and Browser Sessions

Two malicious extensions have been discovered that infect developers' computers with stealer programs on Microsoft's Visual Studio Code marketplace. T...
Redazione RHC - 10/12/2025 - 14:13

Windows Cloud Files Mini Filter Vulnerability Under Active Exploitation

A zero-day vulnerability in the Windows Cloud Files Mini Filter driver (cldflt.sys) is currently being actively exploited. Microsoft has released urge...
Redazione RHC - 10/12/2025 - 10:22
1 3 4 5 6 7 278

Google Chrome Urgent Update Fixes Zero-Day Vulnerability

- December 10th, 2025

An urgent update has been released by Google for the stable version of the Desktop browser, in order to address an extremely serious vulnerability that is currently being exploited. This...

Facebook Linkedin X

EtherRAT Malware Exploits React2Shell Vulnerability with Ethereum C2

- December 10th, 2025

Just two days after the critical React2Shell vulnerability was discovered, Sysdig researchers discovered a new malware, EtherRAT, in a compromised Next.js application. The malware uses Ethereum smart contracts for communication...

Facebook Linkedin X

Is QDay approaching? QuantWare presents its 10,000-qubit quantum processor

- December 9th, 2025

The world of quantum technology has made an impressive leap forward: QuantWare has unveiled the world's first 10,000-qubit processor, 100 times more than any existing device . Furthermore, the new...

Facebook Linkedin X

Ivanti Endpoint Manager Vulnerabilities: Update Now to Prevent RCE

- December 9th, 2025

Ivanti has released an urgent update for its Endpoint Manager (EPM) platform, addressing a set of significant vulnerabilities that could allow attackers to execute code of their choosing or hijack...

Facebook Linkedin X

Malicious VSCode Extensions Steal Crypto Wallets and Browser Sessions

- December 9th, 2025

Two malicious extensions have been discovered that infect developers' computers with stealer programs on Microsoft's Visual Studio Code marketplace. The malware can take screenshots, steal passwords and cryptocurrency wallets, and...

Facebook Linkedin X

Windows Cloud Files Mini Filter Vulnerability Under Active Exploitation

- December 9th, 2025

A zero-day vulnerability in the Windows Cloud Files Mini Filter driver (cldflt.sys) is currently being actively exploited. Microsoft has released urgent security updates to address this vulnerability. The vulnerability is...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE