Welcome to Red Hot Cyber | Cybersecurity News
Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Enterprise BusinessLog 320x200 1
Redhotcyber Banner Sito 970x120px Uscita 101125

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

9.9 Score! Microsoft Fixes Critical Vulnerability in ASP.NET Core

Microsoft has fixed a dangerous vulnerability in Kestrel web server for ASP.NET Core . It has been assigned the identifier...
Redazione RHC - 19 October 2025

Boris Johnson is enthusiastic about AI: he uses ChatGPT for his books.

Former British Prime Minister Boris Johnson has expressed his enthusiasm for artificial intelligence, revealing in an interview that he uses...
Redazione RHC - 19 October 2025

China challenges Intel: Loongson launches fully independent 3C6000 CPU

Wang Songyu , Deputy General Manager of Loongson Technology 's Business Division, reaffirmed on October 18 the company's strategy of...
Redazione RHC - 19 October 2025

Intel releases urgent patches for new Spectre variant

VUSec researchers have presented a paper titled "Training Solo," which challenges the fundamental principles of protection against Spectre-v2 attacks. Previously...
Redazione RHC - 19 October 2025

Blockchain at risk! The quantum threat is a race against time

The race for quantum supremacy is turning into a race for cryptocurrency survival . If quantum computers reach the promised...
Redazione RHC - 19 October 2025

The Most Famous Hacker Girls Ever: Anna Chapman and the Illegal Program

Anna Chapman was a Russian intelligence agent who was arrested on charges of working as a spy for the Moscow...
Redazione RHC - 18 October 2025

9.9 Score! Microsoft Fixes Critical Vulnerability in ASP.NET Core

Microsoft has fixed a dangerous vulnerability in Kestrel web server for ASP.NET Core . It has been assigned the identifier CVE-2025-55315. The flaw allows an attacker logged in with a...
Facebook Linkedin X

Boris Johnson is enthusiastic about AI: he uses ChatGPT for his books.

Former British Prime Minister Boris Johnson has expressed his enthusiasm for artificial intelligence, revealing in an interview that he uses ChatGPT to write his books. "I love AI. I love...
Facebook Linkedin X

China challenges Intel: Loongson launches fully independent 3C6000 CPU

Wang Songyu , Deputy General Manager of Loongson Technology 's Business Division, reaffirmed on October 18 the company's strategy of developing fully independent CPUs , in line with China's national...
Facebook Linkedin X

Intel releases urgent patches for new Spectre variant

VUSec researchers have presented a paper titled "Training Solo," which challenges the fundamental principles of protection against Spectre-v2 attacks. Previously , the domain isolation mechanism was believed to completely eliminate...
Facebook Linkedin X

Blockchain at risk! The quantum threat is a race against time

The race for quantum supremacy is turning into a race for cryptocurrency survival . If quantum computers reach the promised power, they will be able to break the cryptography that...
Facebook Linkedin X

The Most Famous Hacker Girls Ever: Anna Chapman and the Illegal Program

Anna Chapman was a Russian intelligence agent who was arrested on charges of working as a spy for the Moscow government in June 2010 while living in New York. Chapman...
Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sito
TikTok Accused of Illegally Tracking Users’ Data Across Apps
Redazione RHC - 21/12/2025

The popular video app TikTok has found itself at the center of a new scandal over violations of European data protection regulations. The service has been found to track users’ activity not only within its…

Immagine del sito
Naftali Bennett Telegram Account Hacked in Israel Politics
Redazione RHC - 21/12/2025

Former Israeli Prime Minister Naftali Bennett has admitted that his Telegram account was hacked, although his device was not compromised. He made the announcement following reports of a hacked iPhone and a data leak allegedly…

Immagine del sito
Cisco Secure Email Gateway Vulnerability Exploited: Act Now
Redazione RHC - 21/12/2025

A critical zero-day flaw in Cisco Secure Email Gateway and Cisco Secure Email and Web Manager devices is causing concern among security researchers. With over 120 vulnerable devices already identified and actively exploited by attackers,…

Immagine del sito
Airbus Eyes Sovereign Cloud to Mitigate US Data Risks
Redazione RHC - 21/12/2025

In recent months, a question has been emerging with increasing insistence on European corporate boards: is the US cloud really safe for all companies? Especially for those operating in strategic sectors or with economic, industrial,…

Immagine del sito
North Korean Hackers Steal $2 Billion in Crypto, Targeting DeFi Sector
Redazione RHC - 21/12/2025

In 2025, North Korean hackers stole a record $2 billion in cryptocurrency , 51% more than the previous year. However, the number of attacks has decreased, while the damage has increased. According to Chainalysis, North…