Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
TM RedHotCyber 320x100 042514
970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Risk averted for millions of Microsoft users! The critical vulnerability in Microsoft SharePoint 9.8
Di Redazione RHC - 21/11/2025

Microsoft has disclosed a critical vulnerability in SharePoint Online (discovered by RHC through our ongoing monitoring of critical CVEs on our portal), identified as CVE‑2025‑59245 , with a CVSS ...

Immagine del sito
MONOLOCK: The new “silent” ransomware group that rejects leak sites and affiliate panels.
Di Luca Stivali - 21/11/2025

The ransomware landscape is changing. The most exposed actors—LockBit, Hunters International, and Trigona—have paid the price for overexposure, including international operations, infiltrations, d...

Immagine del sito
Critical vulnerability in the WordPress plugin W3 Total Cache. 430,000 sites at risk!
Di Redazione RHC - 21/11/2025

A critical vulnerability, CVE-2025-9501, has been discovered in the popular WordPress plugin W3 Total Cache . This vulnerability allows the execution of arbitrary PHP commands on the server without au...

Immagine del sito
Happy birthday, Windows! 40 years of operating system history and still going strong.
Di Redazione RHC - 20/11/2025

Exactly 40 years ago, on November 20, 1985, Microsoft released Windows 1.0 , the first version of Windows, which attempted to transform the then-personal computer from a machine with a monotonous comm...

Immagine del sito
Multi-threaded Hacking: US Pioneers Automated Operations with AI Agents
Di Redazione RHC - 19/11/2025

In recent months, a new cyber operations infrastructure has been developing in the United States, in which automated agents are becoming not just a support tool, but a full-fledged participant in offe...

Kraken Arrives: The New Ransomware That Assesses Your Environment to Inflict Maximum Damage

Cisco Talos researchers have detected an active wave of attacks using a new ransomware called Kraken. The group began operating in February 2025 and u...
Redazione RHC - 15/11/2025 - 13:05

North Korea reorganizes its intelligence with a new agency

North Korea has restructured its intelligence hierarchy, transforming the former Intelligence Agency into a structure with a much broader mandate. The...
Redazione RHC - 15/11/2025 - 12:41

Cognitive Biases and Cybersecurity: The Fatal Fallacy of “I Have Nothing to Hide”

In Italy, over 3,000 people lose their lives on the roads every year, despite everyone knowing basic safety rules. In cybercrime, the scenario isn't a...
Fabrizio Saviano - 15/11/2025 - 12:39

Did they give you a digital photo frame? It’s more than just family memories.

Researchers have discovered several critical vulnerabilities in Uhale digital picture frames running Android , with some models even downloading and e...
Redazione RHC - 15/11/2025 - 12:38

What are PsyOps? Exploring mind manipulation in the digital age.

Psychological operations, commonly known as PsyOps, are a significant and often poorly understood element of military and security strategy . These op...
Redazione RHC - 15/11/2025 - 11:10

Understanding Firewalls: The First Line of Defense in Cybersecurity

In the world of cybersecurity, firewalls are the first line of defense against cyber threats and attacks. Every day, businesses and home users are exp...
Redazione RHC - 15/11/2025 - 11:03
1 8 9 10 11 12 249

Kraken Arrives: The New Ransomware That Assesses Your Environment to Inflict Maximum Damage

- November 15th, 2025

Cisco Talos researchers have detected an active wave of attacks using a new ransomware called Kraken. The group began operating in February 2025 and uses double-extortion methods, without targeting specific...

Facebook Linkedin X

North Korea reorganizes its intelligence with a new agency

- November 15th, 2025

North Korea has restructured its intelligence hierarchy, transforming the former Intelligence Agency into a structure with a much broader mandate. The new body, called the General Intelligence Directorate (GIRD), brings...

Facebook Linkedin X

Cognitive Biases and Cybersecurity: The Fatal Fallacy of “I Have Nothing to Hide”

- November 15th, 2025

In Italy, over 3,000 people lose their lives on the roads every year, despite everyone knowing basic safety rules. In cybercrime, the scenario isn't all that different: millions of victims...

Facebook Linkedin X

Did they give you a digital photo frame? It’s more than just family memories.

- November 15th, 2025

Researchers have discovered several critical vulnerabilities in Uhale digital picture frames running Android , with some models even downloading and executing malware during startup. They examined the Uhale app and...

Facebook Linkedin X

What are PsyOps? Exploring mind manipulation in the digital age.

- November 15th, 2025

Psychological operations, commonly known as PsyOps, are a significant and often poorly understood element of military and security strategy . These operations involve the use of psychological tactics to influence...

Facebook Linkedin X

Understanding Firewalls: The First Line of Defense in Cybersecurity

- November 15th, 2025

In the world of cybersecurity, firewalls are the first line of defense against cyber threats and attacks. Every day, businesses and home users are exposed to risks such as malware,...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE