Red Hot Cyber. The Cybersecurity Blog
Featured Articles

A vulnerability, designated CVE-2025-61757, was made public by Searchlight Cyber last Thursday. Company researchers discovered the issue and notified Oracle, which led to its disclosure. Oracle fixed ...

Microsoft has disclosed a critical vulnerability in SharePoint Online (discovered by RHC through our ongoing monitoring of critical CVEs on our portal), identified as CVE‑2025‑59245 , with a CVSS ...

The ransomware landscape is changing. The most exposed actors—LockBit, Hunters International, and Trigona—have paid the price for overexposure, including international operations, infiltrations, d...

A critical vulnerability, CVE-2025-9501, has been discovered in the popular WordPress plugin W3 Total Cache . This vulnerability allows the execution of arbitrary PHP commands on the server without au...

Exactly 40 years ago, on November 20, 1985, Microsoft released Windows 1.0 , the first version of Windows, which attempted to transform the then-personal computer from a machine with a monotonous comm...
What is Cross-Site Scripting? An article to help you understand it in a simple way.
Spy Apps: How Spyware Works and Why It’s a Privacy Risk
Asus releases emergency firmware update for vulnerable DSL routers.
Nuclear power entirely in the hands of AI! And what if there’s an accident?
Veeam Analysis: Ransomware Payments Decline, But Data Resilience Remains Critical for EMEA Enterprises
The History of GPS: The History of Satellite Navigation

What is Cross-Site Scripting? An article to help you understand it in a simple way.
Davide Cavallini - November 17th, 2025
Author : Davide Cavallini Today I will try to use the same dialectic ( as previously done in the article on SQL injection ), and explain in a simple way...

Spy Apps: How Spyware Works and Why It’s a Privacy Risk
Redazione RHC - November 17th, 2025
Spyware (also known as spy apps) represent one of the most insidious and dangerous threats of the digital age. These are malicious programs designed to infiltrate a user's device, collecting...

Asus releases emergency firmware update for vulnerable DSL routers.
Redazione RHC - November 17th, 2025
Asus has released an emergency firmware update for several DSL router models. The patch addresses a critical vulnerability that allows attackers to take complete control of devices without authentication. The...

Nuclear power entirely in the hands of AI! And what if there’s an accident?
Redazione RHC - November 17th, 2025
In the technological field, the idea that the future development of generating systems depends inexorably on the expansion of nuclear capacity is taking root, pushing the sector's players to identify...

Veeam Analysis: Ransomware Payments Decline, But Data Resilience Remains Critical for EMEA Enterprises
Redazione RHC - November 17th, 2025
Beyond backup: Businesses need cyber resilience, data portability, secure cloud storage, and hybrid cloud protection . Data from the Veeam Ransomware Trends Reports 2024 and 2025 shows that the number...

The History of GPS: The History of Satellite Navigation
Redazione RHC - November 17th, 2025
It's amazing how far we've come with satellite navigation in the last 40 years. GPS (Global Positioning System) is one of the most useful things to have ever come out...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

