Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The ransomware landscape is changing. The most exposed actors—LockBit, Hunters International, and Trigona—have paid the price for overexposure, including international operations, infiltrations, d...

A critical vulnerability, CVE-2025-9501, has been discovered in the popular WordPress plugin W3 Total Cache . This vulnerability allows the execution of arbitrary PHP commands on the server without au...

Exactly 40 years ago, on November 20, 1985, Microsoft released Windows 1.0 , the first version of Windows, which attempted to transform the then-personal computer from a machine with a monotonous comm...

In recent months, a new cyber operations infrastructure has been developing in the United States, in which automated agents are becoming not just a support tool, but a full-fledged participant in offe...

The scale of the leak, described by a team from the University of Vienna , demonstrates how dangerous the familiar contact search function of popular messaging apps can be. WhatsApp has always emphasi...
Multi-threaded Hacking: US Pioneers Automated Operations with AI Agents
WhatsApp data leak: 3.5 billion numbers “stolen” by researchers at the University of Vienna
Google launches Gemini 3, its most advanced artificial intelligence model
CISA’s ‘Secure by Design’ Pledge: A Year of Progress in Cybersecurity
Cloudflare global outage: It was an internal technical error. Let’s find out the cause.
Cloudflare goes down in the magnificent cloud! Global incident is being resolved.

Multi-threaded Hacking: US Pioneers Automated Operations with AI Agents
Redazione RHC - November 19th, 2025
In recent months, a new cyber operations infrastructure has been developing in the United States, in which automated agents are becoming not just a support tool, but a full-fledged participant...

WhatsApp data leak: 3.5 billion numbers “stolen” by researchers at the University of Vienna
Redazione RHC - November 19th, 2025
The scale of the leak, described by a team from the University of Vienna , demonstrates how dangerous the familiar contact search function of popular messaging apps can be. WhatsApp...

Google launches Gemini 3, its most advanced artificial intelligence model
Redazione RHC - November 19th, 2025
Google has announced the launch of Gemini 3, the next generation of its flagship artificial intelligence model, which the company is integrating into search, the Gemini app, cloud services, and...

CISA’s ‘Secure by Design’ Pledge: A Year of Progress in Cybersecurity
Redazione RHC - November 19th, 2025
By Carl Windsor, Chief Information Security Officer at Fortinet Secure-by-design practices represent a fundamental shift in software development: security is no longer considered an afterthought, but is integrated from the...

Cloudflare global outage: It was an internal technical error. Let’s find out the cause.
Redazione RHC - November 19th, 2025
On November 18, 2025, at 11:20 UTC , a significant portion of Cloudflare's global infrastructure suddenly ceased to properly route Internet traffic, displaying an HTTP error page to millions of...

Cloudflare goes down in the magnificent cloud! Global incident is being resolved.
Redazione RHC - November 18th, 2025
November 18, 2025 - After hours of widespread disruptions , the incident affecting Cloudflare's global network finally appears to be nearing resolution. The company announced it has implemented a fix...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

