Red Hot Cyber. The Cybersecurity Blog
Featured Articles

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

Anthropic has released Claude Opus 4.5 , its new flagship model, which the company says is the most powerful version yet and ranks at the top of the class for practical programming, agent-based produc...
KaruHunters Claims Cyber Attack on RIPE NCC
Microsoft IIS under attack from Chinese criminal hackers: How UAT-8099 exploits authoritative websites
Computer science is no longer a safe career! What’s changing for students and companies?
China cracks down on fake news generated by artificial intelligence
China under surveillance: Users sanctioned for spreading fake news online
Asahi Group under hacker attack: beer supplies at risk

KaruHunters Claims Cyber Attack on RIPE NCC
Redazione RHC - October 3rd, 2025
A post recently appeared on a popular underground forum that's attracting the attention of the cybersecurity community. A user with the handle KaruHunters , already known for his activities within...

Microsoft IIS under attack from Chinese criminal hackers: How UAT-8099 exploits authoritative websites
Redazione RHC - October 3rd, 2025
A Chinese cybercriminal group known as UAT-8099 has been identified by Cisco Talos as responsible for a large-scale attack campaign. The attacks, which began in April 2025, primarily targeted vulnerable...

Computer science is no longer a safe career! What’s changing for students and companies?
Redazione RHC - October 3rd, 2025
For decades, computer science was considered a stable career choice, brimming with opportunities. Today, however, students, universities, and businesses face a radically changed landscape, where once-certain career paths have become...

China cracks down on fake news generated by artificial intelligence
Redazione RHC - October 3rd, 2025
The Cyberspace Administration of China has announced the launch of a two-month nationwide campaign, which began on July 24 , aimed at countering the spread of false information published by...

China under surveillance: Users sanctioned for spreading fake news online
Redazione RHC - October 2nd, 2025
In recent months, Hainan public security authorities have launched investigations and imposed administrative sanctions against several internet users responsible for spreading false information that has disrupted public order. Talk about...

Asahi Group under hacker attack: beer supplies at risk
Redazione RHC - October 2nd, 2025
Last Monday, Asahi Group, Japan's largest beer, whisky, and soft drink maker, temporarily suspended its operations in Japan following a cyberattack that compromised its systems , including order processing, shipping,...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

