Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
2nd Edition GlitchZone RHC 320x100 2
Fortinet 970x120px

Author: Manuel Roccon

Discovering Remote Code Execution (RCE). The most feared security bug!

Of all the vulnerabilities, the most feared by victims and the most sought after by attackers is remote code execution, or RCE. This vulnerability allows arbitrary commands to be executed on the attacked system. These commands can be sent via scripts: consider a PHP page loaded on a web server, Windows shell commands, or even machine instructions in the case of buffer overflows. This type of vulnerability allows a quick takeover of the victim, and this attack is carried out remotely without physical access. These vulnerabilities are exploited for various reasons, from unauthorized system access to the installation of unauthorized software. But

Notepad++ under attack! How a fake DLL opens the door to criminal hackers

A new vulnerability affecting Notepad++ was released in September. The vulnerability has been identified as CVE-2025-56383, and details can be found on the NIST website. CVE-2025-56383 is a DLL hijacking vulnerability affecting the Notepad++ text editor v8.8.3 and potentially later versions. By exploiting this weakness, an attacker can trick the application into loading a malicious DLL that has the same name as a legitimate library required by the program (a common example involves DLL files in the plugins folder). If the attack is successful, the malicious code executes with the same permissions as the user running Notepad++, allowing arbitrary code execution on

Tasting the Exploit: HackerHood tests Microsoft WSUS CVE-2025-59287 Exploit

The cybersecurity landscape was recently rocked by the discovery of a critical Remote Code Execution (RCE) vulnerability in Microsoft’s Windows Server Update Services (WSUS) . Identified as CVE-2025-59287 and with a CVSS score of 9.8 (Critical) , this flaw poses a high and immediate risk to organizations using WSUS for centralized update management. The vulnerability is particularly dangerous because it allows a remote, unauthenticated attacker to execute arbitrary code with system privileges on the affected WSUS servers. After Microsoft released an emergency out-of-band patch on October 23, 2025, which was necessary because the initial October patch had not fully addressed the issue,

Discovering Prompt Injection: When AI Gets Fooled by Words

Generative Artificial Intelligence (GenAI) systems are revolutionizing the way we interact with technology, offering extraordinary capabilities in the creation of text, images, and code. However, this innovation brings with it new risks in terms of security and reliability. One of the main emerging risks is Prompt Injection , an attack that aims to manipulate the model’s behavior by exploiting its linguistic abilities. We will explore the phenomenon of Prompt Injection in a chatbot in detail, starting with the basics of prompts and Retrieval-Augmented Generation (RAG) systems, then analyze how these attacks occur and, finally, present some mitigations to reduce the risk, such