Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The prospect of a four-day workweek, with a resulting three-day long weekend, may not be far off. This is according to Christopher A. Pissarides , a British-Cypriot economist and Nobel Prize winner, w...

The recent 2025.4 release of Kali Linux has been made available to the public, introducing significant improvements to the GNOME, KDE, and Xfce desktop environments . From now on, Wayland will be the ...

An alleged database containing sensitive information on 18 million U.S. citizens over 65 has appeared for sale on a popular dark web forum. The advertiser, who uses the pseudonym “Frenshyny,” clai...

A recent study by Datadog Security Labs reveals an ongoing operation targeting organizations using Microsoft 365 and Okta for single sign-on (SSO) authentication. This operation uses sophisticated tec...

The React Server component security saga continues this week. Following the patching of a critical remote code execution (RCE) vulnerability that led to React2shell, researchers have discovered two ne...
Is QDay approaching? QuantWare presents its 10,000-qubit quantum processor
Ivanti Endpoint Manager Vulnerabilities: Update Now to Prevent RCE
Malicious VSCode Extensions Steal Crypto Wallets and Browser Sessions
Windows Cloud Files Mini Filter Vulnerability Under Active Exploitation
The Dark Side of AI: How Technology is Being Used to Control Humans
Gartner Warns: AI-Powered Browsers Pose Significant Security Risks to Businesses

Is QDay approaching? QuantWare presents its 10,000-qubit quantum processor
Redazione RHC - December 9th, 2025
The world of quantum technology has made an impressive leap forward: QuantWare has unveiled the world's first 10,000-qubit processor, 100 times more than any existing device . Furthermore, the new...

Ivanti Endpoint Manager Vulnerabilities: Update Now to Prevent RCE
Redazione RHC - December 9th, 2025
Ivanti has released an urgent update for its Endpoint Manager (EPM) platform, addressing a set of significant vulnerabilities that could allow attackers to execute code of their choosing or hijack...

Malicious VSCode Extensions Steal Crypto Wallets and Browser Sessions
Redazione RHC - December 9th, 2025
Two malicious extensions have been discovered that infect developers' computers with stealer programs on Microsoft's Visual Studio Code marketplace. The malware can take screenshots, steal passwords and cryptocurrency wallets, and...

Windows Cloud Files Mini Filter Vulnerability Under Active Exploitation
Redazione RHC - December 9th, 2025
A zero-day vulnerability in the Windows Cloud Files Mini Filter driver (cldflt.sys) is currently being actively exploited. Microsoft has released urgent security updates to address this vulnerability. The vulnerability is...

The Dark Side of AI: How Technology is Being Used to Control Humans
Sandro Sana - December 9th, 2025
Cory Doctorow says it with the clarity of someone who has studied the consequences of digital capitalism for years: AI, as it's sold today, isn't about enhancing humans. It's about...

Gartner Warns: AI-Powered Browsers Pose Significant Security Risks to Businesses
Redazione RHC - December 9th, 2025
Gartner analysts have urged businesses to temporarily stop using browsers with built-in artificial intelligence (AI) capabilities . In a recent advisory, the company emphasizes that such tools pose unnecessary risks...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

