Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Cisco Talos has identified a new ransomware campaign called DeadLock : attackers are exploiting a vulnerable Baidu antivirus driver (CVE-2024-51324) to disable EDR systems using the Bring Your Own Vul...

What we wrote in the article ” Patriotic Code: from DDoSia and NoName057(16) to CISM, the algorithm that shapes youth for Putin ” on Red Hot Cyber on July 23rd is now fully consistent with the inf...

Gartner analysts have urged businesses to temporarily stop using browsers with built-in artificial intelligence (AI) capabilities . In a recent advisory, the company emphasizes that such tools pose un...

A critical vulnerability affecting the FortiOS, FortiWeb, FortiProxy , and FortiSwitchManager product lines has been reported by Fortinet via an urgent security advisory. This advisory was issued in c...

It seems the White House isn’t entirely clear … at least judging by yet another change of heart regarding the sale of Nvidia’s advanced chips to China, with the Trump administration having decid...
Microsoft Outlook RCE Vulnerability: Update Now to Prevent Attacks
Google Chrome Urgent Update Fixes Zero-Day Vulnerability
EtherRAT Malware Exploits React2Shell Vulnerability with Ethereum C2
Is QDay approaching? QuantWare presents its 10,000-qubit quantum processor
Ivanti Endpoint Manager Vulnerabilities: Update Now to Prevent RCE
Malicious VSCode Extensions Steal Crypto Wallets and Browser Sessions

Microsoft Outlook RCE Vulnerability: Update Now to Prevent Attacks
Redazione RHC - December 10th, 2025
A critical remote code execution (RCE) vulnerability in Outlook has been patched by Microsoft, potentially allowing attackers to run malicious code on vulnerable systems. The vulnerability, tracked under CVE-2025-62562, stems...

Google Chrome Urgent Update Fixes Zero-Day Vulnerability
Redazione RHC - December 10th, 2025
An urgent update has been released by Google for the stable version of the Desktop browser, in order to address an extremely serious vulnerability that is currently being exploited. This...

EtherRAT Malware Exploits React2Shell Vulnerability with Ethereum C2
Redazione RHC - December 10th, 2025
Just two days after the critical React2Shell vulnerability was discovered, Sysdig researchers discovered a new malware, EtherRAT, in a compromised Next.js application. The malware uses Ethereum smart contracts for communication...

Is QDay approaching? QuantWare presents its 10,000-qubit quantum processor
Redazione RHC - December 9th, 2025
The world of quantum technology has made an impressive leap forward: QuantWare has unveiled the world's first 10,000-qubit processor, 100 times more than any existing device . Furthermore, the new...

Ivanti Endpoint Manager Vulnerabilities: Update Now to Prevent RCE
Redazione RHC - December 9th, 2025
Ivanti has released an urgent update for its Endpoint Manager (EPM) platform, addressing a set of significant vulnerabilities that could allow attackers to execute code of their choosing or hijack...

Malicious VSCode Extensions Steal Crypto Wallets and Browser Sessions
Redazione RHC - December 9th, 2025
Two malicious extensions have been discovered that infect developers' computers with stealer programs on Microsoft's Visual Studio Code marketplace. The malware can take screenshots, steal passwords and cryptocurrency wallets, and...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

