Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Post 462 on Durov’s official channel immediately went into “scream mode”: “ The end of the free internet. The free internet is becoming a tool of control .” No birthday wishes. Durov explain...

Security researchers have discovered a sophisticated exploit campaign that leverages a private out-of-band application security testing (OAST) service hosted on Google Cloud infrastructure. The campai...

The underground cybercrime market continues to evolve rapidly, fueled by specialized groups designing and selling tools for increasingly sophisticated digital scams. Among these, a particularly active...

American aviation and defense components manufacturer ADC Aerospace has found itself in the spotlight due to a possible cyber attack by the Play ransomware group, which appeared on their blog where cr...

This article analyzes the disclosure submitted to Microsoft and available in English on digitaldefense , where images, demonstration videos and a Python code example are available. In recent years, di...
Google Gemini Improves AI-Generated Image Verification
“We Want to Hack You Again!” NSO Group Rejects WhatsApp’s Pegasus Lawsuit
Oracle under attack: Pre-auth RCE vulnerability discovered that compromises entire systems
CrowdStrike Insider Fired for Providing Sensitive Data to Criminal Hackers
Sysmon will finally be integrated into Windows 11 and Windows Server 2025 in 2026
Sneaky2FA: The phishing scam that steals credentials with browser-in-the-browser attacks

Google Gemini Improves AI-Generated Image Verification
Redazione RHC - November 22nd, 2025
Google has expanded the capabilities of its Gemini artificial intelligence service by adding a tool to the app and web version to check images for signs of automatic generation ....

“We Want to Hack You Again!” NSO Group Rejects WhatsApp’s Pegasus Lawsuit
Redazione RHC - November 21st, 2025
Israeli company NSO Group has appealed a California federal court ruling that bars it from using WhatsApp's infrastructure to distribute its Pegasus surveillance software. The case, which has been ongoing...

Oracle under attack: Pre-auth RCE vulnerability discovered that compromises entire systems
Redazione RHC - November 21st, 2025
A vulnerability, designated CVE-2025-61757, was made public by Searchlight Cyber last Thursday. Company researchers discovered the issue and notified Oracle, which led to its disclosure. Oracle fixed CVE-2025-61757 with the...

CrowdStrike Insider Fired for Providing Sensitive Data to Criminal Hackers
Redazione RHC - November 21st, 2025
In recent months, the insider problem has become increasingly important for large companies , and one recent episode involved CrowdStrike. The cybersecurity firm has in fact removed an employee believed...

Sysmon will finally be integrated into Windows 11 and Windows Server 2025 in 2026
Redazione RHC - November 21st, 2025
Microsoft has announced that it will integrate the popular Sysmon tool directly into Windows 11 and Windows Server 2025 in 2026. The announcement was made by Sysinternals creator Mark Russinovich....

Sneaky2FA: The phishing scam that steals credentials with browser-in-the-browser attacks
Redazione RHC - November 21st, 2025
Push Security specialists have noticed that the Sneaky2FA phishing platform now supports browser-in-the-browser attacks, which allow the creation of fake login windows and the theft of credentials and sessions. Sneaky2FA...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

