Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320×100
LECS 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Cybersecurity in December: How Compliance Hurries Leave Companies Vulnerable

December isn't just about Christmas lights: for those working in cybersecurity, it's the month when the human factor collapses and...
Ambra Santoro - 3 December 2025

Managing AI Agents: Mitigating Security Risks in Autonomous Systems

The widespread adoption of artificial intelligence in businesses is profoundly transforming operational processes and, at the same time, introducing new...
Redazione RHC - 3 December 2025

Mistral AI Unveils Powerful Open Source Models for Advanced AI Applications

French company Mistral AI has unveiled its Mistral 3 line of models, making them fully open source under the Apache...
Redazione RHC - 3 December 2025

Maha Grass APT Group Unleashes StreamSpy Malware Attacks

The Patchwork cyber espionage group — also known as Hangover or Dropping Elephant and internally tracked by QiAnXin as APT-Q-36...
Redazione RHC - 3 December 2025

Digital Crime Among Teenagers: Temporary Involvement

Dutch authorities have published data showing that adolescents' involvement in cybercrime is usually temporary. An analysis prepared by the House...
Redazione RHC - 2 December 2025

Porsche Russia Alarm Issues Spark Widespread Vehicle Immobilization

Porsche owners in Russia are increasingly experiencing problems with factory alarms, making it impossible to use their cars. Their cars...
Redazione RHC - 2 December 2025

CISA’s ‘Secure by Design’ Pledge: A Year of Progress in Cybersecurity

By Carl Windsor, Chief Information Security Officer at Fortinet Secure-by-design practices represent a fundamental shift in software development: security is no longer considered an afterthought, but is integrated from the...
Share on Facebook Share on LinkedIn Share on X

Cloudflare global outage: It was an internal technical error. Let’s find out the cause.

On November 18, 2025, at 11:20 UTC , a significant portion of Cloudflare's global infrastructure suddenly ceased to properly route Internet traffic, displaying an HTTP error page to millions of...
Share on Facebook Share on LinkedIn Share on X

Cloudflare goes down in the magnificent cloud! Global incident is being resolved.

November 18, 2025 - After hours of widespread disruptions , the incident affecting Cloudflare's global network finally appears to be nearing resolution. The company announced it has implemented a fix...
Share on Facebook Share on LinkedIn Share on X

Cloudflare Down: Websites and Services to Go Down on November 18, 2025

The morning of November 18, 2025, will be remembered as one of the most anomalous and widespread outages on the Cloudflare network in recent months. The CDN—the beating heart of...
Share on Facebook Share on LinkedIn Share on X

IBM AIX: Two critical bugs allow execution of arbitrary commands (Score 10 and 9.6)

Two serious vulnerabilities in IBM's AIX operating system could allow remote attackers to execute arbitrary commands on affected systems, prompting the company to issue important security updates. Both vulnerabilities represent...
Share on Facebook Share on LinkedIn Share on X

Twitter Hack: $4.1 Million Seized from 26-Year-Old Joseph James O’Connor

The story of the global Twitter hack in the summer of 2020 has had a sequel: British prosecutors have obtained the seizure of cryptocurrency mined by a key participant in...
Share on Facebook Share on LinkedIn Share on X

Shakerati Anonimi: Nicoletta’s experience and the credit card thriller

The room is the same: dim lights, chairs in a circle, thermoses of herbal teas now cold from all the talking and venting. We are Shakerati Anonimi , a group...
Share on Facebook Share on LinkedIn Share on X

Apple ordered to pay $634 million to Masimo for patent infringement

Masimo, an American company that develops medical monitoring technologies, has won another round of litigation with Apple . A federal jury awarded it $634 million for infringing a patent on...
Share on Facebook Share on LinkedIn Share on X

Microsoft Azure blocks a 15.72 terabit per second DDoS attack

A massive DDoS attack was neutralized by Microsoft Azure on October 24. A single endpoint located in Australia was targeted by the attack, which reached a maximum speed of 15.72...
Share on Facebook Share on LinkedIn Share on X

Real World and Fictional World: A Psychological and Philosophical Analysis of the 1999 Film The Matrix by Lana and Lilly Wachowski

We've said too many times that nowadays, social networks have become an integral part of our daily lives: it's now natural to contact an acquaintance with a WhatsApp message, post...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sito
Critical MongoDB Vulnerability Exposed: CVE-2025-14847
Redazione RHC - 23/12/2025

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…

Immagine del sito
RansomHouse Ransomware Upgraded: Enhanced Encryption Threat
Redazione RHC - 22/12/2025

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…

Immagine del sito
Cyber Attacks on the Rise: Wiper Malware and Data Destruction in 2025
Redazione RHC - 22/12/2025

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers use wipers, destructive tools that…

Immagine del sito
MS13-089 Ransomware: Double Extortion Without Encryption
Inva Malaj - 22/12/2025

MS13-089 opens a leak site on the dark web, exposes the first data and adopts a double extortion strategy without encryption. A brand built on an old Microsoft ID For years, “MS13-089” identified a 2013…

Immagine del sito
Microsoft Shifts Activation Process: What It Means for Air-Gapped Systems
Redazione RHC - 22/12/2025

In the past, many users and system administrators have relied on Microsoft’s telephone activation service to manage installations in specific contexts. During the Windows 8 era, MAK ( Multiple Activation Key) licenses were widely available.…