Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
2nd Edition GlitchZone RHC 320x100 2
Redhotcyber Banner Sito 970x120px Uscita 101125

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Happy birthday, Windows! 40 years of operating system history and still going strong.
Di Redazione RHC - 20/11/2025

Exactly 40 years ago, on November 20, 1985, Microsoft released Windows 1.0 , the first version of Windows, which attempted to transform the then-personal computer from a machine with a monotonous comm...

Immagine del sito
Multi-threaded Hacking: US Pioneers Automated Operations with AI Agents
Di Redazione RHC - 19/11/2025

In recent months, a new cyber operations infrastructure has been developing in the United States, in which automated agents are becoming not just a support tool, but a full-fledged participant in offe...

Immagine del sito
WhatsApp data leak: 3.5 billion numbers “stolen” by researchers at the University of Vienna
Di Redazione RHC - 19/11/2025

The scale of the leak, described by a team from the University of Vienna , demonstrates how dangerous the familiar contact search function of popular messaging apps can be. WhatsApp has always emphasi...

Immagine del sito
Cloudflare goes down in the magnificent cloud! Global incident is being resolved.
Di Redazione RHC - 18/11/2025

November 18, 2025 – After hours of widespread disruptions , the incident affecting Cloudflare’s global network finally appears to be nearing resolution. The company announced it has implemented a ...

Immagine del sito
IBM AIX: Two critical bugs allow execution of arbitrary commands (Score 10 and 9.6)
Di Redazione RHC - 18/11/2025

Two serious vulnerabilities in IBM’s AIX operating system could allow remote attackers to execute arbitrary commands on affected systems, prompting the company to issue important security updates. B...

Android malware to surge in 2025: 67% more attacks than last year

Analysts at cybersecurity firm Zscaler calculated that between June 2024 and May 2025 , 239 malicious apps were discovered on Google Play, which in to...
Redazione RHC - 08/11/2025 - 08:37

The most used password in 2025? It’s still “123456”! Humanity never learns.

In 2025, users still rely heavily on basic passwords to protect their accounts. A Comparitech study, based on an analysis of over 2 billion real passw...
Redazione RHC - 08/11/2025 - 08:23

China will overtake the US in the AI race! Nvidia CEO warns, “We’re stuck in cynicism.”

Nvidia CEO Jensen Huang has warned that China will defeat the United States in the artificial intelligence (AI) race. The FT reported that Huang, at t...
Redazione RHC - 07/11/2025 - 21:58

Tesla wants to give Musk 1,000 billion dollars for a science fiction plan. More than the GDP of Switzerland!

Numerous accolades are pouring in for Elon Musk, who continues to deftly lead his empire’s multiple businesses, including Tesla, SpaceX, xAI, and Star...
Redazione RHC - 07/11/2025 - 19:56

Russian Sandworm hackers target Ukrainian grain industry with wiper malware

Russian Sandworm hackers use wiper malware against the Ukrainian grain industry. Ukraine's grain industry has become the latest target of the infamous...
Redazione RHC - 07/11/2025 - 18:11

Highly advanced, adaptive malware uses AI to confuse security defenses

Based on a recent analysis by the Google Threat Intelligence Group (GTIG), a shift has been identified among threat actors over the past year. Continu...
Redazione RHC - 07/11/2025 - 17:50
1 23 24 25 26 27 248

Android malware to surge in 2025: 67% more attacks than last year

- November 8th, 2025

Analysts at cybersecurity firm Zscaler calculated that between June 2024 and May 2025 , 239 malicious apps were discovered on Google Play, which in total were downloaded more than 42...

Facebook Linkedin X

The most used password in 2025? It’s still “123456”! Humanity never learns.

- November 8th, 2025

In 2025, users still rely heavily on basic passwords to protect their accounts. A Comparitech study, based on an analysis of over 2 billion real passwords leaked to data breach...

Facebook Linkedin X

China will overtake the US in the AI race! Nvidia CEO warns, “We’re stuck in cynicism.”

- November 7th, 2025

Nvidia CEO Jensen Huang has warned that China will defeat the United States in the artificial intelligence (AI) race. The FT reported that Huang, at the Future of AI Summit...

Facebook Linkedin X

Tesla wants to give Musk 1,000 billion dollars for a science fiction plan. More than the GDP of Switzerland!

- November 7th, 2025

Numerous accolades are pouring in for Elon Musk, who continues to deftly lead his empire’s multiple businesses, including Tesla, SpaceX, xAI, and Starlink , maintaining his firm hold on the...

Facebook Linkedin X

Russian Sandworm hackers target Ukrainian grain industry with wiper malware

- November 7th, 2025

Russian Sandworm hackers use wiper malware against the Ukrainian grain industry. Ukraine's grain industry has become the latest target of the infamous, state-backed Russian hacking unit Sandworm, as part of...

Facebook Linkedin X

Highly advanced, adaptive malware uses AI to confuse security defenses

- November 7th, 2025

Based on a recent analysis by the Google Threat Intelligence Group (GTIG), a shift has been identified among threat actors over the past year. Continuous improvements in the underground for...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE