Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Exactly 40 years ago, on November 20, 1985, Microsoft released Windows 1.0 , the first version of Windows, which attempted to transform the then-personal computer from a machine with a monotonous comm...

In recent months, a new cyber operations infrastructure has been developing in the United States, in which automated agents are becoming not just a support tool, but a full-fledged participant in offe...

The scale of the leak, described by a team from the University of Vienna , demonstrates how dangerous the familiar contact search function of popular messaging apps can be. WhatsApp has always emphasi...

November 18, 2025 – After hours of widespread disruptions , the incident affecting Cloudflare’s global network finally appears to be nearing resolution. The company announced it has implemented a ...

Two serious vulnerabilities in IBM’s AIX operating system could allow remote attackers to execute arbitrary commands on affected systems, prompting the company to issue important security updates. B...
An AI extension for VS Code turns your PC into a digital hostage
The Louvre’s security myth crumbles! Between audits, ridiculous passwords, and outdated cameras.
Double-dealing: employees of a company that resolved ransomware attacks were launching them themselves
Cybersecurity is democratic: the same virus hits multinationals and housewives
2 critical bugs detected on Cisco Unified Contact Center Express (CCX)
China is using artificial intelligence to improve mass surveillance

An AI extension for VS Code turns your PC into a digital hostage
Redazione RHC - November 7th, 2025
Secure Annex researchers found a malicious extension in the Visual Studio Code Marketplace extension catalog for VS Code that features basic ransomware functionality. The malware was apparently written using Vibe...

The Louvre’s security myth crumbles! Between audits, ridiculous passwords, and outdated cameras.
Redazione RHC - November 7th, 2025
The recent theft at the Louvre Museum, located in the heart of Paris, has shocked not only the art world but also the cybersecurity world. On the night of October...

Double-dealing: employees of a company that resolved ransomware attacks were launching them themselves
Redazione RHC - November 7th, 2025
Three former DigitalMint employees, who investigated ransomware incidents and negotiated with ransomware groups, are accused of hacking into the networks of five American companies. According to the U.S. Department of...

Cybersecurity is democratic: the same virus hits multinationals and housewives
Fabrizio Saviano - November 7th, 2025
The same malware that yesterday blocked the servers of a major bank today encrypts Mrs. Pina's photos on her home PC. As? With an innocuous WhatsApp message, sent by his...

2 critical bugs detected on Cisco Unified Contact Center Express (CCX)
Redazione RHC - November 7th, 2025
Cisco has published two new critical vulnerabilities affecting Cisco Unified Contact Center Express (CCX) , the platform used by thousands of companies to manage contact centers and unified communications. The...

China is using artificial intelligence to improve mass surveillance
Redazione RHC - November 6th, 2025
In Beijing, in a banquet hall of a luxury hotel, police officers from across the country attended a conference dedicated to the application of artificial intelligence to public safety ....
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

