Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Efforts by legislators and law enforcement to combat money laundering and more complex SIM card verification procedures have not significantly weakened the position of anonymous number dealers. This c...

Developers and administrators around the world are urgently updating their servers following the discovery of a critical vulnerability in React Server, which allows attackers to remotely execute unaut...

During the registration process, a critical security flaw (CVE-2025-8489) in the King Addons WordPress Elementor plugin was exploited by attackers, allowing them to gain administrative privileges via ...

Since ChatGPT’s public release in November 2022, artificial intelligence (AI) has been integrated into many aspects of human society. For owners and operators of critical infrastructure, AI can be u...

A botnet service called Aisuru offers an army of compromised IoT devices and routers to launch high-traffic DDoS attacks. In just three months, the massive Aisuru botnet launched more than 1,300 DDoS ...
Anthropic Releases Claude Opus 4.5: AI Model for Enhanced Productivity
Alibaba Qwen3Max Dominates AI Market with Rapid Growth
Digital Surveillance at Work: The Rise of Algorithmic Monitoring
Windows Server Vulnerability Exploited: ShadowPad Malware Deployed
Salesforce Data Breach: ShinyHunters Hack Gainsight Integration
BadAudio Discovered: Ghost Malware Used by APT24 for Three Years Undetected

Anthropic Releases Claude Opus 4.5: AI Model for Enhanced Productivity
Redazione RHC - November 23rd, 2025
Anthropic has released Claude Opus 4.5 , its new flagship model, which the company says is the most powerful version yet and ranks at the top of the class for...

Alibaba Qwen3Max Dominates AI Market with Rapid Growth
Redazione RHC - November 23rd, 2025
On November 24, Alibaba announced Qwen3Max, which had been in public beta for a week , and had already surpassed 10 million downloads. It was a record that shattered all...

Digital Surveillance at Work: The Rise of Algorithmic Monitoring
Redazione RHC - November 23rd, 2025
Remote work has given employees freedom , but with it has also come digital surveillance . We discussed this some time ago in an article, reporting that these monitoring tools...

Windows Server Vulnerability Exploited: ShadowPad Malware Deployed
Redazione RHC - November 23rd, 2025
A recently patched vulnerability in Microsoft’s Windows Server update services has led to a series of attacks using one of the most notorious espionage tools of recent years. The incidents...

Salesforce Data Breach: ShinyHunters Hack Gainsight Integration
Redazione RHC - November 23rd, 2025
The growing data leak from the Salesforce ecosystem has taken a new turn after the ShinyHunters group announced its involvement in the incident. The incident has been ongoing for several...

BadAudio Discovered: Ghost Malware Used by APT24 for Three Years Undetected
Redazione RHC - November 23rd, 2025
Researchers at the Google Threat Intelligence Group (GTIG) have uncovered details of an espionage campaign conducted by the Chinese group APT24. This activity has been ongoing for approximately three years,...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

