Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Cybersecurity is a serious issue, especially when it comes to vulnerabilities that can compromise an entire system. Well, Hewlett Packard Enterprise (HPE) has just raised the alarm about a truly worry...

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert including three new vulnerabilities in its catalog of exploited cyber threats (KEVs), highlighting that these fl...

The psychology of passwords starts right here: trying to understand people before systems. Welcome to “The Mind Behind Passwords,” the column that looks at cybersecurity. From a different perspect...

New details emerge from an Amazon Threat Intelligence report that highlight an alarming shift in Russian government-backed cyber operations. High-level 0-day exploits, often attributed to state-sponso...

A new version, 8.8.9, of the popular text editor Notepad++, has been released by its developers, fixing a flaw in the automatic update system . This issue came to light after some users and investigat...
Apple Patches Critical WebKit Vulnerabilities in iOS Update
Kali Linux 2025.4: Discover the Power of Wayland and Enhanced Security Tools
French Interior Ministry Hit by Cyberattack, Data Security at Risk
IRS.GOV: alleged data breach affects the accounts of 18 million citizens
Amnesty International Launches .onion Site for Secure Access to Human Rights Info
NANOREMOTE Trojan Uses Google Drive for Command and Control

Apple Patches Critical WebKit Vulnerabilities in iOS Update
Redazione RHC - December 12th, 2025
Following the discovery of two critical zero-day vulnerabilities in the WebKit browser engine, Apple has urgently released security updates for iPhone and iPad users. Both vulnerabilities reside in WebKit ,...

Kali Linux 2025.4: Discover the Power of Wayland and Enhanced Security Tools
Redazione RHC - December 11th, 2025
The recent 2025.4 release of Kali Linux has been made available to the public, introducing significant improvements to the GNOME, KDE, and Xfce desktop environments . From now on, Wayland...

French Interior Ministry Hit by Cyberattack, Data Security at Risk
Redazione RHC - December 11th, 2025
The French Ministry of the Interior's email servers were targeted by a cyberattack. The hacker managed to access "several files," but no "serious compromise" has been detected so far. The...

IRS.GOV: alleged data breach affects the accounts of 18 million citizens
Redazione RHC - December 11th, 2025
An alleged database containing sensitive information on 18 million U.S. citizens over 65 has appeared for sale on a popular dark web forum. The advertiser, who uses the pseudonym "Frenshyny,"...

Amnesty International Launches .onion Site for Secure Access to Human Rights Info
Redazione RHC - December 11th, 2025
Amnesty International has launched its own website, accessible via the .onion domain on the Tor network, offering a new secure channel for accessing the organization's information and research. The initiative,...

NANOREMOTE Trojan Uses Google Drive for Command and Control
Redazione RHC - December 11th, 2025
A new multifunctional Windows Trojan called NANOREMOTE uses a cloud file storage service as its command center , making the threat harder to detect and giving attackers a persistent channel...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

