Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Microsoft has disclosed a critical vulnerability in SharePoint Online (discovered by RHC through our ongoing monitoring of critical CVEs on our portal), identified as CVE‑2025‑59245 , with a CVSS ...

The ransomware landscape is changing. The most exposed actors—LockBit, Hunters International, and Trigona—have paid the price for overexposure, including international operations, infiltrations, d...

A critical vulnerability, CVE-2025-9501, has been discovered in the popular WordPress plugin W3 Total Cache . This vulnerability allows the execution of arbitrary PHP commands on the server without au...

Exactly 40 years ago, on November 20, 1985, Microsoft released Windows 1.0 , the first version of Windows, which attempted to transform the then-personal computer from a machine with a monotonous comm...

In recent months, a new cyber operations infrastructure has been developing in the United States, in which automated agents are becoming not just a support tool, but a full-fledged participant in offe...
Cyber Sabotage Alert: Volt Typhoon Prepares for Destructive Activities
Microsoft fixes 63 vulnerabilities, including an actively exploited zero-day
Italy and Adult Sites: The Country Where Entry Is Forbidden… But If You Click Yes, It’s Okay
Top Malware: Flame, the modular “spy” malware targeting the Middle East.
Slammer, the first worm to use a bug that hasn’t been fixed for six months.
The Story of the First Keylogger: How Hidden Keyboard Control Came to Be

Cyber Sabotage Alert: Volt Typhoon Prepares for Destructive Activities
Redazione RHC - November 13th, 2025
The Australian Security Intelligence Organisation (ASIO) has raised the alarm about the readiness of authoritarian states to go beyond cyber espionage to directly sabotage critical infrastructure. Mike Burgess, head of...

Microsoft fixes 63 vulnerabilities, including an actively exploited zero-day
Redazione RHC - November 13th, 2025
On November's Patch Tuesday, Microsoft fixed 63 vulnerabilities , including a critical zero-day vulnerability that had already been exploited in attacks. This time, the fixes affected a wide range of...

Italy and Adult Sites: The Country Where Entry Is Forbidden… But If You Click Yes, It’s Okay
Redazione RHC - November 13th, 2025
From November 12, 2025, AGCOM reported that in line with art. 13-bis of the Caivano decree (dl123/2023) , 47 adult websites accessible from Italy would have to introduce an identity...

Top Malware: Flame, the modular “spy” malware targeting the Middle East.
Massimiliano Brolli - November 12th, 2025
Flame, (also known as Flamer, sKyWIper, Skywiper), is a modular computer malware discovered in 2012 that attacked Middle Eastern target computers running the Microsoft Windows operating system. The program's primary...

Slammer, the first worm to use a bug that hasn’t been fixed for six months.
Redazione RHC - November 12th, 2025
Many years have passed since the SQL Slammer worm spread uncontrollably on January 25, 2003. It was one of the fastest-spreading malware in history , and with this article we...

The Story of the First Keylogger: How Hidden Keyboard Control Came to Be
Redazione RHC - November 12th, 2025
We all know Bruce Schneier , a renowned cryptography and computer security expert, member of the board of directors of the International Association for Cryptological Research and a renowned speaker,...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

