Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Mobile
Banner Ransomfeed 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Critical Windows Vulnerability CVE-2025-59230 Exposed Cybercrime

Critical Windows Vulnerability CVE-2025-59230 Exposed

Windows services dedicated to remote connections have always been an inexhaustible source of "satisfaction" for those involved in cybersecurity, revealing...
Redazione RHC - 15 December 2025
Women in Cybersecurity: Breaking Down Barriers and Stereotypes Cybercrime

Women in Cybersecurity: Breaking Down Barriers and Stereotypes

The scene is always the same: monitors lit, dashboards full of alerts, logs scrolling too quickly, an anxious customer on...
Ada Spinelli - 15 December 2025
Storm-0249 Uses DLL Sideloading in Highly Targeted Attacks Cybercrime

Storm-0249 Uses DLL Sideloading in Highly Targeted Attacks

A well-known initial access broker (IAB) called " Storm-0249 " has changed its operational strategies, using phishing campaigns as well...
Redazione RHC - 15 December 2025
VS Code Extensions Infected with Sophisticated Malware via Typosquatting Cybercrime

VS Code Extensions Infected with Sophisticated Malware via Typosquatting

A sophisticated malware campaign has been detected within the Visual Studio Code (VS Code) marketplace. Researchers at ReversingLabs (RL) have...
Redazione RHC - 15 December 2025
NVIDIA Merlin Security Update: Fixing High-Severity Vulnerabilities Cybercrime

NVIDIA Merlin Security Update: Fixing High-Severity Vulnerabilities

NVIDIA has released a significant security update for its Merlin framework, addressing several high-severity vulnerabilities. These vulnerabilities could allow attackers...
Redazione RHC - 15 December 2025
How Profanity Varies Across Social Media and Cultures Cybercrime

How Profanity Varies Across Social Media and Cultures

Americans are the most likely to swear on social media, but Australians are more creative in their use of the...
Redazione RHC - 15 December 2025

Google Discover AI Headlines: Revolutionizing News Feed or Clickbait Nightmare?

Google is testing AI-generated headlines in its Discover feed, replacing original news headlines with original ones. Sean Hollister, editor-in-chief of The Verge, reported this , noting that short and often...
Share on Facebook Share on LinkedIn Share on X

Storm-0900 Phishing Campaign Spreads XWorm Malware

Over the holiday season, a coordinated attack was detected and blocked by Microsoft Threat Intelligence security analysts, involving tens of thousands of emails crafted to deceive recipients. The cybercriminal group...
Share on Facebook Share on LinkedIn Share on X

Windows 10 Still Running on 1 Billion PCs, Upgrade to Windows 11 Urged

Windows 10 has been officially retired, but it still runs on approximately one billion personal computers worldwide. A significant number of devices are technically ready to upgrade to Windows 11,...
Share on Facebook Share on LinkedIn Share on X

Secure AI Integration in OT Systems: Key Principles and Best Practices

Since ChatGPT's public release in November 2022, artificial intelligence (AI) has been integrated into many aspects of human society. For owners and operators of critical infrastructure, AI can be used...
Share on Facebook Share on LinkedIn Share on X

Aisuru Botnet Unleashes 29.7 Tbps DDoS Attack, Cloudflare Mitigates

A botnet service called Aisuru offers an army of compromised IoT devices and routers to launch high-traffic DDoS attacks. In just three months, the massive Aisuru botnet launched more than...
Share on Facebook Share on LinkedIn Share on X

Critical Vulnerability in Iskra iHUB Devices Exposed

A serious security vulnerability has been discovered in smart metering infrastructure, which could expose utility networks to remote takeover risks. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued...
Share on Facebook Share on LinkedIn Share on X

Roblox Down Russia

Today, the Roblox gaming platform went offline in Russia. However, international services that monitor network outages reported no issues during the same period. The main complaints concerned the inability to...
Share on Facebook Share on LinkedIn Share on X

Inside Lazarus! The fake candidate who fooled North Korean cyber spies

A joint investigation by BCA LTD, NorthScan, and ANY.RUN has exposed one of North Korea's most secretive hacking schemes. Under the guise of routine recruitment, the team monitored how operators...
Share on Facebook Share on LinkedIn Share on X

Kawasaki CORLEO Robot Quadrupede for Human Transport by 2035

Kawasaki Heavy Industries plans to launch a quadruped robot capable of carrying humans in 2035. Kawasaki Heavy Industries announced on December 3 that it has begun production of " CORLEO...
Share on Facebook Share on LinkedIn Share on X

Candle Subsea Cable Revolutionizes Asia-Pacific Internet Connectivity

70 million simultaneous 8K videos at 570 Tbps ! This is a staggering amount of transport power in a submarine cable and will change internet access in the Asia-Pacific region....
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Iran Protests Escalate as Reza Pahlavi Calls for Action Against Government
Redazione RHC - 09/01/2026

Iranian protesters chanted and marched through the streets until Friday morning, following a call from exiled former Prince Reza Pahlavi to demonstrate, despite the Iranian theocracy cutting off the country from the internet and international…

Immagine del sitoCybercrime
Veeam Backup Vulnerability: Critical RCE Flaw Discovered – Update Now
Redazione RHC - 08/01/2026

Backups are generally considered the last line of defense, but this week Veeam reminded us that backup systems themselves can become entry points for attacks. The company released security updates for Backup & Replication ,…

Immagine del sitoCybercrime
When Attack Discovery Becomes Automated, Detection Stops Scaling
Alexander Rogan - 08/01/2026

For much of the past two decades, cybersecurity has been built on a simple assumption: malicious activity can be detected, analysed, and responded to before meaningful damage occurs. This assumption shaped everything from SOC design…

Immagine del sitoCybercrime
CVE-2026-21858: n8n Vulnerability Exposes Thousands of Servers to RCE
Redazione RHC - 08/01/2026

The vulnerability, identified as CVE-2026-21858, which we recently reported on, affects approximately 100,000 servers worldwide, threatening to expose proprietary API keys, customer databases, and AI workflows. The vulnerability, with a CVSS score of 10, has…

Immagine del sitoCybercrime
Disable Windows 11 AI Features Easily with RemoveWindowsAI Tool
Redazione RHC - 07/01/2026

A new open-source script allows Windows 11 users to widely disable the operating system’s built-in artificial intelligence features . The project, developed by Zoicware , is called RemoveWindowsAI and aims to offer greater control over…