Welcome to Red Hot Cyber | Cybersecurity News
Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
320×100
970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Women in Cybersecurity: Breaking Down Barriers and Stereotypes
Di Ada Spinelli - 15/12/2025

The scene is always the same: monitors lit, dashboards full of alerts, logs scrolling too quickly, an anxious customer on the other end of the call. You sit down, look around, and realize that, once a...

Immagine del sito
Storm-0249 Uses DLL Sideloading in Highly Targeted Attacks
Di Redazione RHC - 15/12/2025

A well-known initial access broker (IAB) called ” Storm-0249 ” has changed its operational strategies, using phishing campaigns as well as highly targeted attacks, which exploit the very security ...

Immagine del sito
WhatsApp: all it takes is a phone number to know when you sleep, go out, or come home
Di Redazione RHC - 14/12/2025

A tool has been released that allows for the discreet monitoring of WhatsApp and Signal user activity using just a phone number. The tracking mechanism covers over three billion accounts and allows fo...

Immagine del sito
Top 25 Software Vulnerabilities 2025: MITRE CWE Ranking and Security Tips
Di Redazione RHC - 13/12/2025

MITRE has released its ranking of the 25 most dangerous software vulnerabilities predicted for 2025, based on data collected through the National Vulnerability Database. These vulnerabilities were ide...

Immagine del sito
The Future of Work: 4-Day Week with AI and Tech Advances
Di Redazione RHC - 13/12/2025

The prospect of a four-day workweek, with a resulting three-day long weekend, may not be far off. This is according to Christopher A. Pissarides , a British-Cypriot economist and Nobel Prize winner, w...

DeadLock Ransomware Exploits Baidu Antivirus Vulnerability for EDR Bypass

Cisco Talos has identified a new ransomware campaign called DeadLock : attackers are exploiting a vulnerable Baidu antivirus driver (CVE-2024-51324) t...
Redazione RHC - 11/12/2025 - 12:44

VPN Credentials on the Dark Web: A Growing Cybersecurity Threat

In the darkest corners of the internet, the trafficking of stolen data and unauthorized access continues to thrive. A recent post on a closed undergro...
Redazione RHC - 11/12/2025 - 09:54

Uncovering Russia’s Cyber Operations: CISM’s Role in DDoS Attacks

What we wrote in the article " Patriotic Code: from DDoSia and NoName057(16) to CISM, the algorithm that shapes youth for Putin " on Red Hot Cyber on ...
Redazione RHC - 11/12/2025 - 09:34

Microsoft Outlook RCE Vulnerability: Update Now to Prevent Attacks

A critical remote code execution (RCE) vulnerability in Outlook has been patched by Microsoft, potentially allowing attackers to run malicious code on...
Redazione RHC - 11/12/2025 - 07:36

Google Chrome Urgent Update Fixes Zero-Day Vulnerability

An urgent update has been released by Google for the stable version of the Desktop browser, in order to address an extremely serious vulnerability tha...
Redazione RHC - 11/12/2025 - 07:19

EtherRAT Malware Exploits React2Shell Vulnerability with Ethereum C2

Just two days after the critical React2Shell vulnerability was discovered, Sysdig researchers discovered a new malware, EtherRAT, in a compromised Nex...
Redazione RHC - 11/12/2025 - 07:13
1 4 5 6 7 8 280

DeadLock Ransomware Exploits Baidu Antivirus Vulnerability for EDR Bypass

- December 10th, 2025

Cisco Talos has identified a new ransomware campaign called DeadLock : attackers are exploiting a vulnerable Baidu antivirus driver (CVE-2024-51324) to disable EDR systems using the Bring Your Own Vulnerable...

Facebook Linkedin X

VPN Credentials on the Dark Web: A Growing Cybersecurity Threat

- December 10th, 2025

In the darkest corners of the internet, the trafficking of stolen data and unauthorized access continues to thrive. A recent post on a closed underground forum shows 896 FortiSSL VPN...

Facebook Linkedin X

Uncovering Russia’s Cyber Operations: CISM’s Role in DDoS Attacks

- December 10th, 2025

What we wrote in the article " Patriotic Code: from DDoSia and NoName057(16) to CISM, the algorithm that shapes youth for Putin " on Red Hot Cyber on July 23rd...

Facebook Linkedin X

Microsoft Outlook RCE Vulnerability: Update Now to Prevent Attacks

- December 10th, 2025

A critical remote code execution (RCE) vulnerability in Outlook has been patched by Microsoft, potentially allowing attackers to run malicious code on vulnerable systems. The vulnerability, tracked under CVE-2025-62562, stems...

Facebook Linkedin X

Google Chrome Urgent Update Fixes Zero-Day Vulnerability

- December 10th, 2025

An urgent update has been released by Google for the stable version of the Desktop browser, in order to address an extremely serious vulnerability that is currently being exploited. This...

Facebook Linkedin X

EtherRAT Malware Exploits React2Shell Vulnerability with Ethereum C2

- December 10th, 2025

Just two days after the critical React2Shell vulnerability was discovered, Sysdig researchers discovered a new malware, EtherRAT, in a compromised Next.js application. The malware uses Ethereum smart contracts for communication...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE