Welcome to Red Hot Cyber | Cybersecurity News
Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Fortinet 320x100px
Crowdstriker 970×120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

SSRF Vulnerability in Zimbra Collaboration Suite: Urgent Update Required

A Server-Side Request Forgery (SSRF) security vulnerability was recently discovered in Zimbra Collaboration Suite, raising security concerns and prompting administrators...
Redazione RHC - 18 October 2025

Problems with localhost on Windows 11 after October updates

The October updates for Windows 11 broke localhost functionality, preventing applications connecting to 127.0.0.1 over HTTP/2 from working properly. While...
Redazione RHC - 18 October 2025

Huawei unveils HarmonyOS 6: the new operating system coming October 22nd

And to think that until a few years ago, Huawei and much of its ecosystem were entirely dependent on Google...
Redazione RHC - 18 October 2025

Do you have a photo? Now they can find you on Tinder (even if you’re not there)

On social media, particular attention has been paid to those websites that allow you to identify an individual's Tinder profile...
Redazione RHC - 17 October 2025

“Yuheng,” the microchip that captures the spectra of 10,000 stars per second

A team led by Professor Fang Lu from the Department of Electrical Engineering at Tsinghua University has announced the development...
Redazione RHC - 17 October 2025

Apache ActiveMQ NMS AMQP Vulnerability in 9.8: Urgent Update Required

An untrusted data deserialization vulnerability has been identified in the Apache ActiveMQ NMS AMQP client, exposing systems to potential attacks...
Redazione RHC - 17 October 2025

Telegram as a Command & Control Platform for Criminal Activities and the Role of Threat Intelligence

In today's cybersecurity landscape, one of the most worrying trends is the abuse of legitimate messaging platforms for malicious purposes. Telegram in particular is increasingly being exploited by criminal groups...
Share on Facebook Share on LinkedIn Share on X

Houthi threat or mysterious incident? The Red Sea paralyzes Asia and the Middle East.

As we reported this morning, several undersea cables in the Red Sea have been severed, causing internet access delays and service disruptions in Asia and the Middle East. Microsoft said...
Share on Facebook Share on LinkedIn Share on X

Fired by the AI She Helped Create: The Shocking Story of Katherine Sullivan

In Australia, a 65-year-old bank employee was fired after the introduction of artificial intelligence, despite having contributed to its development. The story was reported by The Sun and concerns Katherine...
Share on Facebook Share on LinkedIn Share on X

Salesloft Cyber Attack: Chatbot Drift Temporarily Disabled

Salesloft announced that it would temporarily deactivate its AI-powered chatbot Drift on September 5, after several companies were hit by a massive supply chain attack. The incident resulted in the...
Share on Facebook Share on LinkedIn Share on X

Toha Arrest: The Future of the Black Market After XSS Shuts Down

The arrest of the alleged administrator of the Russian-language forum XSS[.]is, nicknamed Toha, has become a turning point for the entire black market. According to law enforcement, on July 22,...
Share on Facebook Share on LinkedIn Share on X

Digital blackout: Broken undersea cables in the Red Sea slow down Microsoft’s cloud.

On Saturday, Microsoft reported issues with its Azure cloud platform due to the breakage of several international undersea cables in the Red Sea. The outage affected traffic transiting the Middle...
Share on Facebook Share on LinkedIn Share on X

Google fined €2.95 billion for abusing its dominant position

The European Commission has fined Google €2.95 billion for abusing its dominant position in the digital advertising market. The regulator said that Google used its influence to promote its own...
Share on Facebook Share on LinkedIn Share on X

Discover the Dark Web: Access, Secrets, and Helpful Links to the Onion Network

The Dark Web is a part of the internet that cannot be reached with standard browsers (Chrome, Firefox, Edge). To access it, you need to use specific tools like the...
Share on Facebook Share on LinkedIn Share on X

Geoffrey Hinton’s shocking revelations: Better to trust China than Zuckerberg!

Geoffrey Hinton, known as the "godfather of artificial intelligence," recently shared his thoughts in a panel with the Financial Times. Despite his public image as an "AI whistleblower" after resigning...
Share on Facebook Share on LinkedIn Share on X

Jupiter, the exascale supercomputer that aims to revolutionize AI in Europe

The Jupiter supercomputer, inaugurated at the Jülich Supercomputing Center in Germany, represents a milestone for Europe. It is the continent's first exascale supercomputer, capable of performing at least one quadrillion...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sito
TikTok Accused of Illegally Tracking Users’ Data Across Apps
Redazione RHC - 21/12/2025

The popular video app TikTok has found itself at the center of a new scandal over violations of European data protection regulations. The service has been found to track users’ activity not only within its…

Immagine del sito
Naftali Bennett Telegram Account Hacked in Israel Politics
Redazione RHC - 21/12/2025

Former Israeli Prime Minister Naftali Bennett has admitted that his Telegram account was hacked, although his device was not compromised. He made the announcement following reports of a hacked iPhone and a data leak allegedly…

Immagine del sito
Cisco Secure Email Gateway Vulnerability Exploited: Act Now
Redazione RHC - 21/12/2025

A critical zero-day flaw in Cisco Secure Email Gateway and Cisco Secure Email and Web Manager devices is causing concern among security researchers. With over 120 vulnerable devices already identified and actively exploited by attackers,…

Immagine del sito
Airbus Eyes Sovereign Cloud to Mitigate US Data Risks
Redazione RHC - 21/12/2025

In recent months, a question has been emerging with increasing insistence on European corporate boards: is the US cloud really safe for all companies? Especially for those operating in strategic sectors or with economic, industrial,…

Immagine del sito
North Korean Hackers Steal $2 Billion in Crypto, Targeting DeFi Sector
Redazione RHC - 21/12/2025

In 2025, North Korean hackers stole a record $2 billion in cryptocurrency , 51% more than the previous year. However, the number of attacks has decreased, while the damage has increased. According to Chainalysis, North…