Red Hot Cyber. The Cybersecurity Blog
Featured Articles

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

Anthropic has released Claude Opus 4.5 , its new flagship model, which the company says is the most powerful version yet and ranks at the top of the class for practical programming, agent-based produc...

On November 24, Alibaba announced Qwen3Max, which had been in public beta for a week , and had already surpassed 10 million downloads. It was a record that shattered all others. In a very short time, ...

Remote work has given employees freedom , but with it has also come digital surveillance . We discussed this some time ago in an article, reporting that these monitoring tools are also coming to Micro...

On November 13, Eurofiber France, a respected provider of fiber optic network and VPN solutions to many of France’s leading companies, discovered that its systems had been compromised by criminal ha...
RondoDox Botnet Discovered: Thousands of Devices at Risk
Microsoft Defender incorrectly flags SQL Server 2019 as End of Life
The Truth About Windows XP License Key: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8
Intel and NVIDIA: From Historic Rivals to Partners in the New Artificial Intelligence Market
7-Zip Vulnerable: Symbolic Link Exploit Allows Malicious Code Injection
Salesforce refuses to pay ransom for Scattered Lapsus Hunters attacks

RondoDox Botnet Discovered: Thousands of Devices at Risk
Redazione RHC - October 11th, 2025
A large botnet called RondoDox has been discovered exploiting 56 vulnerabilities in more than 30 different devices, including bugs first demonstrated during the Pwn2Own hacking competition. Attackers target a wide...

Microsoft Defender incorrectly flags SQL Server 2019 as End of Life
Redazione RHC - October 10th, 2025
We know that product end-of-life (EoL) brings security risks and the accumulation of vulnerabilities, as manufacturers stop releasing corrective patches. However, starting a replatforming process five years early seems like...

The Truth About Windows XP License Key: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8
Redazione RHC - October 10th, 2025
On October 10, new revelations emerged regarding one of the most notorious license keys in computing history: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8 , tied to Windows XP . For years, this character sequence has...

Intel and NVIDIA: From Historic Rivals to Partners in the New Artificial Intelligence Market
Redazione RHC - October 10th, 2025
During an interview with Mad Money host Jim Cramer, NVIDIA CEO Jen-Hsun Huang recalled a key moment from his time with Intel. The interview, reported on October 9 by Fast...

7-Zip Vulnerable: Symbolic Link Exploit Allows Malicious Code Injection
Redazione RHC - October 10th, 2025
Two critical vulnerabilities in the 7-Zip archiver allowed remote code execution when processing ZIP files. The flaws affect how the program handles symbolic links within archives, allowing directory traversal and...

Salesforce refuses to pay ransom for Scattered Lapsus Hunters attacks
Redazione RHC - October 10th, 2025
Salesforce representatives have announced that they have no intention of negotiating or paying a ransom to the attackers responsible for a series of large-scale attacks that resulted in the theft...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

