Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The scene is always the same: monitors lit, dashboards full of alerts, logs scrolling too quickly, an anxious customer on the other end of the call. You sit down, look around, and realize that, once a...

A well-known initial access broker (IAB) called ” Storm-0249 ” has changed its operational strategies, using phishing campaigns as well as highly targeted attacks, which exploit the very security ...

A tool has been released that allows for the discreet monitoring of WhatsApp and Signal user activity using just a phone number. The tracking mechanism covers over three billion accounts and allows fo...

MITRE has released its ranking of the 25 most dangerous software vulnerabilities predicted for 2025, based on data collected through the National Vulnerability Database. These vulnerabilities were ide...

The prospect of a four-day workweek, with a resulting three-day long weekend, may not be far off. This is according to Christopher A. Pissarides , a British-Cypriot economist and Nobel Prize winner, w...
Critical Windows Vulnerability CVE-2025-59230 Exposed
Women in Cybersecurity: Breaking Down Barriers and Stereotypes
Storm-0249 Uses DLL Sideloading in Highly Targeted Attacks
VS Code Extensions Infected with Sophisticated Malware via Typosquatting
NVIDIA Merlin Security Update: Fixing High-Severity Vulnerabilities
How Profanity Varies Across Social Media and Cultures

Critical Windows Vulnerability CVE-2025-59230 Exposed
Redazione RHC - December 14th, 2025
Windows services dedicated to remote connections have always been an inexhaustible source of "satisfaction" for those involved in cybersecurity, revealing vulnerabilities of enormous impact. Among the most famous examples is...

Women in Cybersecurity: Breaking Down Barriers and Stereotypes
Ada Spinelli - December 14th, 2025
The scene is always the same: monitors lit, dashboards full of alerts, logs scrolling too quickly, an anxious customer on the other end of the call. You sit down, look...

Storm-0249 Uses DLL Sideloading in Highly Targeted Attacks
Redazione RHC - December 14th, 2025
A well-known initial access broker (IAB) called " Storm-0249 " has changed its operational strategies, using phishing campaigns as well as highly targeted attacks, which exploit the very security tools...

VS Code Extensions Infected with Sophisticated Malware via Typosquatting
Redazione RHC - December 14th, 2025
A sophisticated malware campaign has been detected within the Visual Studio Code (VS Code) marketplace. Researchers at ReversingLabs (RL) have identified 19 malicious extensions that successfully evaded standard detection methods...

NVIDIA Merlin Security Update: Fixing High-Severity Vulnerabilities
Redazione RHC - December 14th, 2025
NVIDIA has released a significant security update for its Merlin framework, addressing several high-severity vulnerabilities. These vulnerabilities could allow attackers to execute malicious code or alter sensitive data within AI...

How Profanity Varies Across Social Media and Cultures
Redazione RHC - December 14th, 2025
Americans are the most likely to swear on social media, but Australians are more creative in their use of the infamous "f" swear word. This is the conclusion reached by...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

