Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Gartner analysts have urged businesses to temporarily stop using browsers with built-in artificial intelligence (AI) capabilities . In a recent advisory, the company emphasizes that such tools pose un...

A critical vulnerability affecting the FortiOS, FortiWeb, FortiProxy , and FortiSwitchManager product lines has been reported by Fortinet via an urgent security advisory. This advisory was issued in c...

It seems the White House isn’t entirely clear … at least judging by yet another change of heart regarding the sale of Nvidia’s advanced chips to China, with the Trump administration having decid...

According to a recently released report by the Financial Crimes Enforcement Network (FinCEN) , global ransomware activity peaked in 2023, only to plummet in 2024. This decline is attributed to success...

Despite significant geopolitical challenges, the mercenary spyware industry remains a resilient and persistent threat; in this context, the well-known vendor Intellexa continues to expand its arsenal....
Ivanti Endpoint Manager Vulnerabilities: Update Now to Prevent RCE
Malicious VSCode Extensions Steal Crypto Wallets and Browser Sessions
Windows Cloud Files Mini Filter Vulnerability Under Active Exploitation
The Dark Side of AI: How Technology is Being Used to Control Humans
Gartner Warns: AI-Powered Browsers Pose Significant Security Risks to Businesses
Asus Hacked: Everest Ransomware Group Claims Data Breach

Ivanti Endpoint Manager Vulnerabilities: Update Now to Prevent RCE
Redazione RHC - December 9th, 2025
Ivanti has released an urgent update for its Endpoint Manager (EPM) platform, addressing a set of significant vulnerabilities that could allow attackers to execute code of their choosing or hijack...

Malicious VSCode Extensions Steal Crypto Wallets and Browser Sessions
Redazione RHC - December 9th, 2025
Two malicious extensions have been discovered that infect developers' computers with stealer programs on Microsoft's Visual Studio Code marketplace. The malware can take screenshots, steal passwords and cryptocurrency wallets, and...

Windows Cloud Files Mini Filter Vulnerability Under Active Exploitation
Redazione RHC - December 9th, 2025
A zero-day vulnerability in the Windows Cloud Files Mini Filter driver (cldflt.sys) is currently being actively exploited. Microsoft has released urgent security updates to address this vulnerability. The vulnerability is...

The Dark Side of AI: How Technology is Being Used to Control Humans
Sandro Sana - December 9th, 2025
Cory Doctorow says it with the clarity of someone who has studied the consequences of digital capitalism for years: AI, as it's sold today, isn't about enhancing humans. It's about...

Gartner Warns: AI-Powered Browsers Pose Significant Security Risks to Businesses
Redazione RHC - December 9th, 2025
Gartner analysts have urged businesses to temporarily stop using browsers with built-in artificial intelligence (AI) capabilities . In a recent advisory, the company emphasizes that such tools pose unnecessary risks...

Asus Hacked: Everest Ransomware Group Claims Data Breach
Redazione RHC - December 9th, 2025
Asus announced that one of its suppliers had been hacked. Meanwhile, the Everest ransomware group claimed to have stolen a terabyte of data from three companies: Asus, Qualcomm, and ArcSoft....
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

