Red Hot Cyber. The Cybersecurity Blog
Featured Articles

In today’s environment, securing a network requires much more than setting a complex password. A cyber attack against a wireless network follows a structured path that evolves from passive monitorin...

Post 462 on Durov’s official channel immediately went into “scream mode”: “ The end of the free internet. The free internet is becoming a tool of control .” No birthday wishes. Durov explain...

Security researchers have discovered a sophisticated exploit campaign that leverages a private out-of-band application security testing (OAST) service hosted on Google Cloud infrastructure. The campai...

The underground cybercrime market continues to evolve rapidly, fueled by specialized groups designing and selling tools for increasingly sophisticated digital scams. Among these, a particularly active...

American aviation and defense components manufacturer ADC Aerospace has found itself in the spotlight due to a possible cyber attack by the Play ransomware group, which appeared on their blog where cr...
KrakenBite Phishing Service Exposed
ADC Aerospace Hit by Play Ransomware Attack, Data Breach Feared
Microsoft 365 Security Risk: Interface Poisoning Attacks
Calendar Subscriptions: A Hidden Danger in Your Digital Life
Airbus A320 Recall Due to ELAC System Failure Caused by Solar Flares
OpenAI Faces Fierce Competition from Google’s Gemini 3

KrakenBite Phishing Service Exposed
Redazione RHC - November 30th, 2025
The underground cybercrime market continues to evolve rapidly, fueled by specialized groups designing and selling tools for increasingly sophisticated digital scams. Among these, a particularly active player in recent weeks...

ADC Aerospace Hit by Play Ransomware Attack, Data Breach Feared
Redazione RHC - November 30th, 2025
American aviation and defense components manufacturer ADC Aerospace has found itself in the spotlight due to a possible cyber attack by the Play ransomware group, which appeared on their blog...

Microsoft 365 Security Risk: Interface Poisoning Attacks
Massimiliano Dal Cero - November 30th, 2025
This article analyzes the disclosure submitted to Microsoft and available in English on digitaldefense , where images, demonstration videos and a Python code example are available. In recent years, digital...

Calendar Subscriptions: A Hidden Danger in Your Digital Life
Redazione RHC - November 30th, 2025
Digital calendars have long been a convenient way to keep track of daily activities, but new research from Bitsight shows that this familiar tool can become a real attack channel....

Airbus A320 Recall Due to ELAC System Failure Caused by Solar Flares
Redazione RHC - November 30th, 2025
Airbus has announced the recall of approximately 6,500 A320 aircraft due to potential failures in the ELAC control system caused by powerful solar flares. The recall followed a sudden loss...

OpenAI Faces Fierce Competition from Google’s Gemini 3
Redazione RHC - November 30th, 2025
OpenAI, a company valued at around $500 billion, is facing increasingly fierce technical competition . Google's latest version of Gemini 3 , in particular, outperforms OpenAI's GPT-5 in several areas....
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

