Welcome to Red Hot Cyber | Cybersecurity News
Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Crowdstrike 320×100
Banner Desktop

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Anonymity for Sale: Russian SIM Card Market Thrives Amid Regulations
Di Redazione RHC - 04/12/2025

Efforts by legislators and law enforcement to combat money laundering and more complex SIM card verification procedures have not significantly weakened the position of anonymous number dealers. This c...

Immagine del sito
Critical React Server Vulnerability: Update Now to Prevent RCE Attacks
Di Redazione RHC - 04/12/2025

Developers and administrators around the world are urgently updating their servers following the discovery of a critical vulnerability in React Server, which allows attackers to remotely execute unaut...

Immagine del sito
Critical Vulnerability in King Addons for Elementor Exploited
Di Redazione RHC - 04/12/2025

During the registration process, a critical security flaw (CVE-2025-8489) in the King Addons WordPress Elementor plugin was exploited by attackers, allowing them to gain administrative privileges via ...

Immagine del sito
Secure AI Integration in OT Systems: Key Principles and Best Practices
Di Redazione RHC - 04/12/2025

Since ChatGPT’s public release in November 2022, artificial intelligence (AI) has been integrated into many aspects of human society. For owners and operators of critical infrastructure, AI can be u...

Immagine del sito
Aisuru Botnet Unleashes 29.7 Tbps DDoS Attack, Cloudflare Mitigates
Di Redazione RHC - 03/12/2025

A botnet service called Aisuru offers an army of compromised IoT devices and routers to launch high-traffic DDoS attacks. In just three months, the massive Aisuru botnet launched more than 1,300 DDoS ...

Anthropic Releases Claude Opus 4.5: AI Model for Enhanced Productivity

Anthropic has released Claude Opus 4.5 , its new flagship model, which the company says is the most powerful version yet and ranks at the top of the c...
Redazione RHC - 24/11/2025 - 21:50

Alibaba Qwen3Max Dominates AI Market with Rapid Growth

On November 24, Alibaba announced Qwen3Max, which had been in public beta for a week , and had already surpassed 10 million downloads. It was a record...
Redazione RHC - 24/11/2025 - 19:39

Digital Surveillance at Work: The Rise of Algorithmic Monitoring

Remote work has given employees freedom , but with it has also come digital surveillance . We discussed this some time ago in an article, reporting th...
Redazione RHC - 24/11/2025 - 18:42

Windows Server Vulnerability Exploited: ShadowPad Malware Deployed

A recently patched vulnerability in Microsoft’s Windows Server update services has led to a series of attacks using one of the most notorious espionag...
Redazione RHC - 24/11/2025 - 16:30

Salesforce Data Breach: ShinyHunters Hack Gainsight Integration

The growing data leak from the Salesforce ecosystem has taken a new turn after the ShinyHunters group announced its involvement in the incident. The i...
Redazione RHC - 24/11/2025 - 16:11

BadAudio Discovered: Ghost Malware Used by APT24 for Three Years Undetected

Researchers at the Google Threat Intelligence Group (GTIG) have uncovered details of an espionage campaign conducted by the Chinese group APT24. This ...
Redazione RHC - 24/11/2025 - 12:12
1 12 13 14 15 16 266

Anthropic Releases Claude Opus 4.5: AI Model for Enhanced Productivity

- November 23rd, 2025

Anthropic has released Claude Opus 4.5 , its new flagship model, which the company says is the most powerful version yet and ranks at the top of the class for...

Facebook Linkedin X

Alibaba Qwen3Max Dominates AI Market with Rapid Growth

- November 23rd, 2025

On November 24, Alibaba announced Qwen3Max, which had been in public beta for a week , and had already surpassed 10 million downloads. It was a record that shattered all...

Facebook Linkedin X

Digital Surveillance at Work: The Rise of Algorithmic Monitoring

- November 23rd, 2025

Remote work has given employees freedom , but with it has also come digital surveillance . We discussed this some time ago in an article, reporting that these monitoring tools...

Facebook Linkedin X

Windows Server Vulnerability Exploited: ShadowPad Malware Deployed

- November 23rd, 2025

A recently patched vulnerability in Microsoft’s Windows Server update services has led to a series of attacks using one of the most notorious espionage tools of recent years. The incidents...

Facebook Linkedin X

Salesforce Data Breach: ShinyHunters Hack Gainsight Integration

- November 23rd, 2025

The growing data leak from the Salesforce ecosystem has taken a new turn after the ShinyHunters group announced its involvement in the incident. The incident has been ongoing for several...

Facebook Linkedin X

BadAudio Discovered: Ghost Malware Used by APT24 for Three Years Undetected

- November 23rd, 2025

Researchers at the Google Threat Intelligence Group (GTIG) have uncovered details of an espionage campaign conducted by the Chinese group APT24. This activity has been ongoing for approximately three years,...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE