Red Hot Cyber. The Cybersecurity Blog
Featured Articles

In today’s environment, securing a network requires much more than setting a complex password. A cyber attack against a wireless network follows a structured path that evolves from passive monitorin...

Post 462 on Durov’s official channel immediately went into “scream mode”: “ The end of the free internet. The free internet is becoming a tool of control .” No birthday wishes. Durov explain...

Security researchers have discovered a sophisticated exploit campaign that leverages a private out-of-band application security testing (OAST) service hosted on Google Cloud infrastructure. The campai...

The underground cybercrime market continues to evolve rapidly, fueled by specialized groups designing and selling tools for increasingly sophisticated digital scams. Among these, a particularly active...

American aviation and defense components manufacturer ADC Aerospace has found itself in the spotlight due to a possible cyber attack by the Play ransomware group, which appeared on their blog where cr...
Windows Server Vulnerability Exploited: ShadowPad Malware Deployed
Salesforce Data Breach: ShinyHunters Hack Gainsight Integration
BadAudio Discovered: Ghost Malware Used by APT24 for Three Years Undetected
Satoshi Nakamoto’s Net Worth Drops 34% as Cryptocurrency Crash
Cyberattack on Eurofiber France: Find out what happened
From Risk to Resilience: How Veeam Protects Your Supply Chain from Disruptions

Windows Server Vulnerability Exploited: ShadowPad Malware Deployed
Redazione RHC - November 23rd, 2025
A recently patched vulnerability in Microsoft’s Windows Server update services has led to a series of attacks using one of the most notorious espionage tools of recent years. The incidents...

Salesforce Data Breach: ShinyHunters Hack Gainsight Integration
Redazione RHC - November 23rd, 2025
The growing data leak from the Salesforce ecosystem has taken a new turn after the ShinyHunters group announced its involvement in the incident. The incident has been ongoing for several...

BadAudio Discovered: Ghost Malware Used by APT24 for Three Years Undetected
Redazione RHC - November 23rd, 2025
Researchers at the Google Threat Intelligence Group (GTIG) have uncovered details of an espionage campaign conducted by the Chinese group APT24. This activity has been ongoing for approximately three years,...

Satoshi Nakamoto’s Net Worth Drops 34% as Cryptocurrency Crash
Redazione RHC - November 23rd, 2025
The net worth of Satoshi Nakamoto, the mysterious figure known as the founder of Bitcoin, has dropped 34% in the last month due to the recent virtual asset crash ....

Cyberattack on Eurofiber France: Find out what happened
Redazione RHC - November 23rd, 2025
On November 13, Eurofiber France, a respected provider of fiber optic network and VPN solutions to many of France's leading companies, discovered that its systems had been compromised by criminal...

From Risk to Resilience: How Veeam Protects Your Supply Chain from Disruptions
Redazione RHC - November 23rd, 2025
With the increasing digitalization of the supply chain , resilience is no longer just about logistics and suppliers, but also the security and visibility of IT systems. Disruptions are no...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

