Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Mobile
Banner Ransomfeed 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Salt Typhoon Hackers Exposed: Cisco Training Led to Global Telecom Breaches Cybercrime

Salt Typhoon Hackers Exposed: Cisco Training Led to Global Telecom Breaches

A recent study by SentinelLabs sheds new light on the roots of the hacker group known as “Salt Typhoon ,”...
Redazione RHC - 16 December 2025
Critical Red Hat OpenShift GitOps Vulnerability Exposed Cybercrime

Critical Red Hat OpenShift GitOps Vulnerability Exposed

A critical flaw has been discovered in Red Hat OpenShift GitOps, putting Kubernetes clusters at risk by allowing users with...
Redazione RHC - 16 December 2025
FortiGate Vulnerability Exploited: Update Now to Prevent SSO Attacks Cybercrime

FortiGate Vulnerability Exploited: Update Now to Prevent SSO Attacks

Threat actors began actively exploiting the high-severity vulnerabilities shortly after the vendor disclosed them to bypass authentication on FortiGate devices....
Redazione RHC - 16 December 2025
Shannon: Autonomous Penetration Testing with AI Cybercrime

Shannon: Autonomous Penetration Testing with AI

Shannon acts as a penetration tester who doesn't just report vulnerabilities, but launches actual exploits. Shannon's goal is to breach...
Redazione RHC - 15 December 2025
Protecting Loved Ones from Scams and Financial Abuse Cybercrime

Protecting Loved Ones from Scams and Financial Abuse

Hi guys,My name is Giorgio , I'm 58 years old, I've always worked as an administrative technician, and in life,...
Redazione RHC - 15 December 2025
Critical Windows Vulnerability CVE-2025-59230 Exposed Cybercrime

Critical Windows Vulnerability CVE-2025-59230 Exposed

Windows services dedicated to remote connections have always been an inexhaustible source of "satisfaction" for those involved in cybersecurity, revealing...
Redazione RHC - 15 December 2025

Critical Vulnerability in King Addons for Elementor Exploited

During the registration process, a critical security flaw (CVE-2025-8489) in the King Addons WordPress Elementor plugin was exploited by attackers, allowing them to gain administrative privileges via a privilege escalation...
Share on Facebook Share on LinkedIn Share on X

Google Discover AI Headlines: Revolutionizing News Feed or Clickbait Nightmare?

Google is testing AI-generated headlines in its Discover feed, replacing original news headlines with original ones. Sean Hollister, editor-in-chief of The Verge, reported this , noting that short and often...
Share on Facebook Share on LinkedIn Share on X

Storm-0900 Phishing Campaign Spreads XWorm Malware

Over the holiday season, a coordinated attack was detected and blocked by Microsoft Threat Intelligence security analysts, involving tens of thousands of emails crafted to deceive recipients. The cybercriminal group...
Share on Facebook Share on LinkedIn Share on X

Windows 10 Still Running on 1 Billion PCs, Upgrade to Windows 11 Urged

Windows 10 has been officially retired, but it still runs on approximately one billion personal computers worldwide. A significant number of devices are technically ready to upgrade to Windows 11,...
Share on Facebook Share on LinkedIn Share on X

Secure AI Integration in OT Systems: Key Principles and Best Practices

Since ChatGPT's public release in November 2022, artificial intelligence (AI) has been integrated into many aspects of human society. For owners and operators of critical infrastructure, AI can be used...
Share on Facebook Share on LinkedIn Share on X

Aisuru Botnet Unleashes 29.7 Tbps DDoS Attack, Cloudflare Mitigates

A botnet service called Aisuru offers an army of compromised IoT devices and routers to launch high-traffic DDoS attacks. In just three months, the massive Aisuru botnet launched more than...
Share on Facebook Share on LinkedIn Share on X

Critical Vulnerability in Iskra iHUB Devices Exposed

A serious security vulnerability has been discovered in smart metering infrastructure, which could expose utility networks to remote takeover risks. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued...
Share on Facebook Share on LinkedIn Share on X

Roblox Down Russia

Today, the Roblox gaming platform went offline in Russia. However, international services that monitor network outages reported no issues during the same period. The main complaints concerned the inability to...
Share on Facebook Share on LinkedIn Share on X

Inside Lazarus! The fake candidate who fooled North Korean cyber spies

A joint investigation by BCA LTD, NorthScan, and ANY.RUN has exposed one of North Korea's most secretive hacking schemes. Under the guise of routine recruitment, the team monitored how operators...
Share on Facebook Share on LinkedIn Share on X

Kawasaki CORLEO Robot Quadrupede for Human Transport by 2035

Kawasaki Heavy Industries plans to launch a quadruped robot capable of carrying humans in 2035. Kawasaki Heavy Industries announced on December 3 that it has begun production of " CORLEO...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Internet Shutdowns Cost $19.7B in 2025, Sophisticated Censorship Rises
Redazione RHC - 11/01/2026

Imagine a situation where the internet appears to be working, but websites won’t open beyond the first screen, messaging apps are intermittent, and businesses are constantly changing. According to the authors of a recent annual…

Immagine del sitoCybercrime
Instagram Data Leak Exposes 17.5 Million Users on Dark Web
Redazione RHC - 10/01/2026

A massive digital archive containing the private information of approximately 17.5 million Instagram users appears to have fallen into the hands of cybercriminals. A few hours ago, the alarm was raised after several Reddit users…

Immagine del sitoCybercrime
Undertow Vulnerability CVE-2025-12543 Exposes Java Ecosystem to Critical Security Risks
Redazione RHC - 09/01/2026

A flaw has been discovered in the foundation of the Java web ecosystem. Undertow , the high-performance web server that powers enterprise heavyweights like WildFly and JBoss EAP , has been hit by a critical…

Immagine del sitoCybercrime
Iran Protests Escalate as Reza Pahlavi Calls for Action Against Government
Redazione RHC - 09/01/2026

Iranian protesters chanted and marched through the streets until Friday morning, following a call from exiled former Prince Reza Pahlavi to demonstrate, despite the Iranian theocracy cutting off the country from the internet and international…

Immagine del sitoCybercrime
Veeam Backup Vulnerability: Critical RCE Flaw Discovered – Update Now
Redazione RHC - 08/01/2026

Backups are generally considered the last line of defense, but this week Veeam reminded us that backup systems themselves can become entry points for attacks. The company released security updates for Backup & Replication ,…