Red Hot Cyber. The Cybersecurity Blog
Featured Articles

MITRE has released its ranking of the 25 most dangerous software vulnerabilities predicted for 2025, based on data collected through the National Vulnerability Database. These vulnerabilities were ide...

The prospect of a four-day workweek, with a resulting three-day long weekend, may not be far off. This is according to Christopher A. Pissarides , a British-Cypriot economist and Nobel Prize winner, w...

The recent 2025.4 release of Kali Linux has been made available to the public, introducing significant improvements to the GNOME, KDE, and Xfce desktop environments . From now on, Wayland will be the ...

An alleged database containing sensitive information on 18 million U.S. citizens over 65 has appeared for sale on a popular dark web forum. The advertiser, who uses the pseudonym “Frenshyny,” clai...

A recent study by Datadog Security Labs reveals an ongoing operation targeting organizations using Microsoft 365 and Okta for single sign-on (SSO) authentication. This operation uses sophisticated tec...
Trump Launches Genesis AI Mission to Revolutionize US Science
Cybersecurity in the Middle East: Egitto and Qatar Lead the Way
US States Crack Down on VPNs and Online Privacy for Minors
Logitech Hit by Clop Ransomware Attack, Data Breach Exposed
Malware Uses Finger Command to Infect Windows Devices
The Future of Tech: How to Navigate the Digital World

Trump Launches Genesis AI Mission to Revolutionize US Science
Redazione RHC - November 25th, 2025
US President Donald Trump signed an executive order, " Launching the Genesis Mission," establishing a national program for the use of artificial intelligence in science. The document was published on...

Cybersecurity in the Middle East: Egitto and Qatar Lead the Way
Redazione RHC - November 25th, 2025
Global attention to cybersecurity continues to grow in a context dominated by digital transformation and the rapid spread of artificial intelligence (AI) technologies, making it easier to identify vulnerabilities and...

US States Crack Down on VPNs and Online Privacy for Minors
Redazione RHC - November 25th, 2025
Several U.S. states are debating new restrictions that could significantly change traditional approaches to online privacy . Legislators in Wisconsin and Michigan are considering initiatives to combat material deemed harmful...

Logitech Hit by Clop Ransomware Attack, Data Breach Exposed
Redazione RHC - November 25th, 2025
Logitech representatives have notified authorities of a cyberattack and a serious data breach . The notorious Clop ransomware group, which has been targeting companies for several months by exploiting a...

Malware Uses Finger Command to Infect Windows Devices
Redazione RHC - November 25th, 2025
A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet,...

The Future of Tech: How to Navigate the Digital World
Redazione RHC - November 25th, 2025
There are books that explain technology and books that make you understand why you should pause for a minute before scrolling through a feed. Il Futuro Prossimo , Sandro Sana...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

