Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The prospect of a four-day workweek, with a resulting three-day long weekend, may not be far off. This is according to Christopher A. Pissarides , a British-Cypriot economist and Nobel Prize winner, w...

The recent 2025.4 release of Kali Linux has been made available to the public, introducing significant improvements to the GNOME, KDE, and Xfce desktop environments . From now on, Wayland will be the ...

An alleged database containing sensitive information on 18 million U.S. citizens over 65 has appeared for sale on a popular dark web forum. The advertiser, who uses the pseudonym “Frenshyny,” clai...

A recent study by Datadog Security Labs reveals an ongoing operation targeting organizations using Microsoft 365 and Okta for single sign-on (SSO) authentication. This operation uses sophisticated tec...

The React Server component security saga continues this week. Following the patching of a critical remote code execution (RCE) vulnerability that led to React2shell, researchers have discovered two ne...
Critical React Server Vulnerability: Update Now to Prevent RCE Attacks
Critical Vulnerability in King Addons for Elementor Exploited
Google Discover AI Headlines: Revolutionizing News Feed or Clickbait Nightmare?
Storm-0900 Phishing Campaign Spreads XWorm Malware
Windows 10 Still Running on 1 Billion PCs, Upgrade to Windows 11 Urged
Secure AI Integration in OT Systems: Key Principles and Best Practices

Critical React Server Vulnerability: Update Now to Prevent RCE Attacks
Redazione RHC - December 3rd, 2025
Developers and administrators around the world are urgently updating their servers following the discovery of a critical vulnerability in React Server, which allows attackers to remotely execute unauthenticated code with...

Critical Vulnerability in King Addons for Elementor Exploited
Redazione RHC - December 3rd, 2025
During the registration process, a critical security flaw (CVE-2025-8489) in the King Addons WordPress Elementor plugin was exploited by attackers, allowing them to gain administrative privileges via a privilege escalation...

Google Discover AI Headlines: Revolutionizing News Feed or Clickbait Nightmare?
Redazione RHC - December 3rd, 2025
Google is testing AI-generated headlines in its Discover feed, replacing original news headlines with original ones. Sean Hollister, editor-in-chief of The Verge, reported this , noting that short and often...

Storm-0900 Phishing Campaign Spreads XWorm Malware
Redazione RHC - December 3rd, 2025
Over the holiday season, a coordinated attack was detected and blocked by Microsoft Threat Intelligence security analysts, involving tens of thousands of emails crafted to deceive recipients. The cybercriminal group...

Windows 10 Still Running on 1 Billion PCs, Upgrade to Windows 11 Urged
Redazione RHC - December 3rd, 2025
Windows 10 has been officially retired, but it still runs on approximately one billion personal computers worldwide. A significant number of devices are technically ready to upgrade to Windows 11,...

Secure AI Integration in OT Systems: Key Principles and Best Practices
Redazione RHC - December 3rd, 2025
Since ChatGPT's public release in November 2022, artificial intelligence (AI) has been integrated into many aspects of human society. For owners and operators of critical infrastructure, AI can be used...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

