Red Hot Cyber. The Cybersecurity Blog
Featured Articles

A recent study by SentinelLabs sheds new light on the roots of the hacker group known as “Salt Typhoon ,” which carried out one of the most audacious espionage operations of the past decade. First...

Shannon acts as a penetration tester who doesn’t just report vulnerabilities, but launches actual exploits. Shannon’s goal is to breach your web application’s security before anyone with malicio...

The scene is always the same: monitors lit, dashboards full of alerts, logs scrolling too quickly, an anxious customer on the other end of the call. You sit down, look around, and realize that, once a...

A well-known initial access broker (IAB) called ” Storm-0249 ” has changed its operational strategies, using phishing campaigns as well as highly targeted attacks, which exploit the very security ...

A tool has been released that allows for the discreet monitoring of WhatsApp and Signal user activity using just a phone number. The tracking mechanism covers over three billion accounts and allows fo...
ARTEMIS Leads in AI-Powered Pentesting, Outperforming Human Experts
Apple Patches Critical WebKit Vulnerabilities in iOS Update
Kali Linux 2025.4: Discover the Power of Wayland and Enhanced Security Tools
French Interior Ministry Hit by Cyberattack, Data Security at Risk
IRS.GOV: alleged data breach affects the accounts of 18 million citizens
Amnesty International Launches .onion Site for Secure Access to Human Rights Info

ARTEMIS Leads in AI-Powered Pentesting, Outperforming Human Experts
Redazione RHC - December 12th, 2025
Stanford researchers and their colleagues conducted an unusual experiment: they compared the performance of ten professional specialists and a set of autonomous AI agents in a real-world corporate pentest. The...

Apple Patches Critical WebKit Vulnerabilities in iOS Update
Redazione RHC - December 12th, 2025
Following the discovery of two critical zero-day vulnerabilities in the WebKit browser engine, Apple has urgently released security updates for iPhone and iPad users. Both vulnerabilities reside in WebKit ,...

Kali Linux 2025.4: Discover the Power of Wayland and Enhanced Security Tools
Redazione RHC - December 11th, 2025
The recent 2025.4 release of Kali Linux has been made available to the public, introducing significant improvements to the GNOME, KDE, and Xfce desktop environments . From now on, Wayland...

French Interior Ministry Hit by Cyberattack, Data Security at Risk
Redazione RHC - December 11th, 2025
The French Ministry of the Interior's email servers were targeted by a cyberattack. The hacker managed to access "several files," but no "serious compromise" has been detected so far. The...

IRS.GOV: alleged data breach affects the accounts of 18 million citizens
Redazione RHC - December 11th, 2025
An alleged database containing sensitive information on 18 million U.S. citizens over 65 has appeared for sale on a popular dark web forum. The advertiser, who uses the pseudonym "Frenshyny,"...

Amnesty International Launches .onion Site for Secure Access to Human Rights Info
Redazione RHC - December 11th, 2025
Amnesty International has launched its own website, accessible via the .onion domain on the Tor network, offering a new secure channel for accessing the organization's information and research. The initiative,...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

