Welcome to Red Hot Cyber | Cybersecurity News
Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Crowdstrike 320×100
2nd Edition GlitchZone RHC 970x120 2

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Microsoft 365 Okta Phishing Attack: Experts Warn of New Threat
Di Redazione RHC - 12/12/2025

A recent study by Datadog Security Labs reveals an ongoing operation targeting organizations using Microsoft 365 and Okta for single sign-on (SSO) authentication. This operation uses sophisticated tec...

Immagine del sito
React Server Components Vulnerability: Update to Prevent DoS Attacks
Di Redazione RHC - 12/12/2025

The React Server component security saga continues this week. Following the patching of a critical remote code execution (RCE) vulnerability that led to React2shell, researchers have discovered two ne...

Immagine del sito
DeadLock Ransomware Exploits Baidu Antivirus Vulnerability for EDR Bypass
Di Redazione RHC - 11/12/2025

Cisco Talos has identified a new ransomware campaign called DeadLock : attackers are exploiting a vulnerable Baidu antivirus driver (CVE-2024-51324) to disable EDR systems using the Bring Your Own Vul...

Immagine del sito
Uncovering Russia’s Cyber Operations: CISM’s Role in DDoS Attacks
Di Redazione RHC - 11/12/2025

What we wrote in the article ” Patriotic Code: from DDoSia and NoName057(16) to CISM, the algorithm that shapes youth for Putin ” on Red Hot Cyber on July 23rd is now fully consistent with the inf...

Immagine del sito
Gartner Warns: AI-Powered Browsers Pose Significant Security Risks to Businesses
Di Redazione RHC - 10/12/2025

Gartner analysts have urged businesses to temporarily stop using browsers with built-in artificial intelligence (AI) capabilities . In a recent advisory, the company emphasizes that such tools pose un...

Windows Server Vulnerability Exploited: ShadowPad Malware Deployed

A recently patched vulnerability in Microsoft’s Windows Server update services has led to a series of attacks using one of the most notorious espionag...
Redazione RHC - 24/11/2025 - 16:30

Salesforce Data Breach: ShinyHunters Hack Gainsight Integration

The growing data leak from the Salesforce ecosystem has taken a new turn after the ShinyHunters group announced its involvement in the incident. The i...
Redazione RHC - 24/11/2025 - 16:11

BadAudio Discovered: Ghost Malware Used by APT24 for Three Years Undetected

Researchers at the Google Threat Intelligence Group (GTIG) have uncovered details of an espionage campaign conducted by the Chinese group APT24. This ...
Redazione RHC - 24/11/2025 - 12:12

Satoshi Nakamoto’s Net Worth Drops 34% as Cryptocurrency Crash

The net worth of Satoshi Nakamoto, the mysterious figure known as the founder of Bitcoin, has dropped 34% in the last month due to the recent virtual ...
Redazione RHC - 24/11/2025 - 09:56

Cyberattack on Eurofiber France: Find out what happened

On November 13, Eurofiber France, a respected provider of fiber optic network and VPN solutions to many of France's leading companies, discovered that...
Redazione RHC - 24/11/2025 - 08:09

From Risk to Resilience: How Veeam Protects Your Supply Chain from Disruptions

With the increasing digitalization of the supply chain , resilience is no longer just about logistics and suppliers, but also the security and visibil...
Redazione RHC - 24/11/2025 - 07:34
1 23 24 25 26 27 276

Windows Server Vulnerability Exploited: ShadowPad Malware Deployed

- November 23rd, 2025

A recently patched vulnerability in Microsoft’s Windows Server update services has led to a series of attacks using one of the most notorious espionage tools of recent years. The incidents...

Facebook Linkedin X

Salesforce Data Breach: ShinyHunters Hack Gainsight Integration

- November 23rd, 2025

The growing data leak from the Salesforce ecosystem has taken a new turn after the ShinyHunters group announced its involvement in the incident. The incident has been ongoing for several...

Facebook Linkedin X

BadAudio Discovered: Ghost Malware Used by APT24 for Three Years Undetected

- November 23rd, 2025

Researchers at the Google Threat Intelligence Group (GTIG) have uncovered details of an espionage campaign conducted by the Chinese group APT24. This activity has been ongoing for approximately three years,...

Facebook Linkedin X

Satoshi Nakamoto’s Net Worth Drops 34% as Cryptocurrency Crash

- November 23rd, 2025

The net worth of Satoshi Nakamoto, the mysterious figure known as the founder of Bitcoin, has dropped 34% in the last month due to the recent virtual asset crash ....

Facebook Linkedin X

Cyberattack on Eurofiber France: Find out what happened

- November 23rd, 2025

On November 13, Eurofiber France, a respected provider of fiber optic network and VPN solutions to many of France's leading companies, discovered that its systems had been compromised by criminal...

Facebook Linkedin X

From Risk to Resilience: How Veeam Protects Your Supply Chain from Disruptions

- November 23rd, 2025

With the increasing digitalization of the supply chain , resilience is no longer just about logistics and suppliers, but also the security and visibility of IT systems. Disruptions are no...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE