Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Gartner analysts have urged businesses to temporarily stop using browsers with built-in artificial intelligence (AI) capabilities . In a recent advisory, the company emphasizes that such tools pose un...

A critical vulnerability affecting the FortiOS, FortiWeb, FortiProxy , and FortiSwitchManager product lines has been reported by Fortinet via an urgent security advisory. This advisory was issued in c...

It seems the White House isn’t entirely clear … at least judging by yet another change of heart regarding the sale of Nvidia’s advanced chips to China, with the Trump administration having decid...

According to a recently released report by the Financial Crimes Enforcement Network (FinCEN) , global ransomware activity peaked in 2023, only to plummet in 2024. This decline is attributed to success...

Despite significant geopolitical challenges, the mercenary spyware industry remains a resilient and persistent threat; in this context, the well-known vendor Intellexa continues to expand its arsenal....
Microsoft Blocks KMS38 Activation Method for Windows 10 and 11
Future prospects for computer science and technology graduates
ATMs targeted! Cybersecurity experts reveal an attack campaign targeting ATMs.
Google Gemini Improves AI-Generated Image Verification
“We Want to Hack You Again!” NSO Group Rejects WhatsApp’s Pegasus Lawsuit
Oracle under attack: Pre-auth RCE vulnerability discovered that compromises entire systems

Microsoft Blocks KMS38 Activation Method for Windows 10 and 11
Redazione RHC - November 22nd, 2025
Users noticed that last week Microsoft developers disabled the offline activation method for Windows 11 and 10 via KMS38, which has been used by hackers around the world for years....

Future prospects for computer science and technology graduates
Redazione RHC - November 22nd, 2025
Artificial intelligence is changing the way recent computer science graduates approach the world of work. It's not about sudden job disappearances , but rather a transformation of entry-level roles in...

ATMs targeted! Cybersecurity experts reveal an attack campaign targeting ATMs.
Redazione RHC - November 22nd, 2025
Group-IB experts presented a detailed analysis of the long-running UNC2891 campaign, which demonstrated the continuing sophistication of ATM attack schemes. Attention focused on the Raspberry Pi, which the attackers used...

Google Gemini Improves AI-Generated Image Verification
Redazione RHC - November 22nd, 2025
Google has expanded the capabilities of its Gemini artificial intelligence service by adding a tool to the app and web version to check images for signs of automatic generation ....

“We Want to Hack You Again!” NSO Group Rejects WhatsApp’s Pegasus Lawsuit
Redazione RHC - November 21st, 2025
Israeli company NSO Group has appealed a California federal court ruling that bars it from using WhatsApp's infrastructure to distribute its Pegasus surveillance software. The case, which has been ongoing...

Oracle under attack: Pre-auth RCE vulnerability discovered that compromises entire systems
Redazione RHC - November 21st, 2025
A vulnerability, designated CVE-2025-61757, was made public by Searchlight Cyber last Thursday. Company researchers discovered the issue and notified Oracle, which led to its disclosure. Oracle fixed CVE-2025-61757 with the...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

