Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Microsoft has disclosed a critical vulnerability in SharePoint Online (discovered by RHC through our ongoing monitoring of critical CVEs on our portal), identified as CVE‑2025‑59245 , with a CVSS ...

The ransomware landscape is changing. The most exposed actors—LockBit, Hunters International, and Trigona—have paid the price for overexposure, including international operations, infiltrations, d...

A critical vulnerability, CVE-2025-9501, has been discovered in the popular WordPress plugin W3 Total Cache . This vulnerability allows the execution of arbitrary PHP commands on the server without au...

Exactly 40 years ago, on November 20, 1985, Microsoft released Windows 1.0 , the first version of Windows, which attempted to transform the then-personal computer from a machine with a monotonous comm...

In recent months, a new cyber operations infrastructure has been developing in the United States, in which automated agents are becoming not just a support tool, but a full-fledged participant in offe...
Tesla wants to give Musk 1,000 billion dollars for a science fiction plan. More than the GDP of Switzerland!
Russian Sandworm hackers target Ukrainian grain industry with wiper malware
Highly advanced, adaptive malware uses AI to confuse security defenses
An AI extension for VS Code turns your PC into a digital hostage
The Louvre’s security myth crumbles! Between audits, ridiculous passwords, and outdated cameras.
Double-dealing: employees of a company that resolved ransomware attacks were launching them themselves

Tesla wants to give Musk 1,000 billion dollars for a science fiction plan. More than the GDP of Switzerland!
Redazione RHC - November 7th, 2025
Numerous accolades are pouring in for Elon Musk, who continues to deftly lead his empire’s multiple businesses, including Tesla, SpaceX, xAI, and Starlink , maintaining his firm hold on the...

Russian Sandworm hackers target Ukrainian grain industry with wiper malware
Redazione RHC - November 7th, 2025
Russian Sandworm hackers use wiper malware against the Ukrainian grain industry. Ukraine's grain industry has become the latest target of the infamous, state-backed Russian hacking unit Sandworm, as part of...

Highly advanced, adaptive malware uses AI to confuse security defenses
Redazione RHC - November 7th, 2025
Based on a recent analysis by the Google Threat Intelligence Group (GTIG), a shift has been identified among threat actors over the past year. Continuous improvements in the underground for...

An AI extension for VS Code turns your PC into a digital hostage
Redazione RHC - November 7th, 2025
Secure Annex researchers found a malicious extension in the Visual Studio Code Marketplace extension catalog for VS Code that features basic ransomware functionality. The malware was apparently written using Vibe...

The Louvre’s security myth crumbles! Between audits, ridiculous passwords, and outdated cameras.
Redazione RHC - November 7th, 2025
The recent theft at the Louvre Museum, located in the heart of Paris, has shocked not only the art world but also the cybersecurity world. On the night of October...

Double-dealing: employees of a company that resolved ransomware attacks were launching them themselves
Redazione RHC - November 7th, 2025
Three former DigitalMint employees, who investigated ransomware incidents and negotiated with ransomware groups, are accused of hacking into the networks of five American companies. According to the U.S. Department of...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

