Red Hot Cyber. The Cybersecurity Blog
Featured Articles

MITRE has released its ranking of the 25 most dangerous software vulnerabilities predicted for 2025, based on data collected through the National Vulnerability Database. These vulnerabilities were ide...

The prospect of a four-day workweek, with a resulting three-day long weekend, may not be far off. This is according to Christopher A. Pissarides , a British-Cypriot economist and Nobel Prize winner, w...

The recent 2025.4 release of Kali Linux has been made available to the public, introducing significant improvements to the GNOME, KDE, and Xfce desktop environments . From now on, Wayland will be the ...

An alleged database containing sensitive information on 18 million U.S. citizens over 65 has appeared for sale on a popular dark web forum. The advertiser, who uses the pseudonym “Frenshyny,” clai...

A recent study by Datadog Security Labs reveals an ongoing operation targeting organizations using Microsoft 365 and Okta for single sign-on (SSO) authentication. This operation uses sophisticated tec...
Digital Surveillance at Work: The Rise of Algorithmic Monitoring
Windows Server Vulnerability Exploited: ShadowPad Malware Deployed
Salesforce Data Breach: ShinyHunters Hack Gainsight Integration
BadAudio Discovered: Ghost Malware Used by APT24 for Three Years Undetected
Satoshi Nakamoto’s Net Worth Drops 34% as Cryptocurrency Crash
Cyberattack on Eurofiber France: Find out what happened

Digital Surveillance at Work: The Rise of Algorithmic Monitoring
Redazione RHC - November 23rd, 2025
Remote work has given employees freedom , but with it has also come digital surveillance . We discussed this some time ago in an article, reporting that these monitoring tools...

Windows Server Vulnerability Exploited: ShadowPad Malware Deployed
Redazione RHC - November 23rd, 2025
A recently patched vulnerability in Microsoft’s Windows Server update services has led to a series of attacks using one of the most notorious espionage tools of recent years. The incidents...

Salesforce Data Breach: ShinyHunters Hack Gainsight Integration
Redazione RHC - November 23rd, 2025
The growing data leak from the Salesforce ecosystem has taken a new turn after the ShinyHunters group announced its involvement in the incident. The incident has been ongoing for several...

BadAudio Discovered: Ghost Malware Used by APT24 for Three Years Undetected
Redazione RHC - November 23rd, 2025
Researchers at the Google Threat Intelligence Group (GTIG) have uncovered details of an espionage campaign conducted by the Chinese group APT24. This activity has been ongoing for approximately three years,...

Satoshi Nakamoto’s Net Worth Drops 34% as Cryptocurrency Crash
Redazione RHC - November 23rd, 2025
The net worth of Satoshi Nakamoto, the mysterious figure known as the founder of Bitcoin, has dropped 34% in the last month due to the recent virtual asset crash ....

Cyberattack on Eurofiber France: Find out what happened
Redazione RHC - November 23rd, 2025
On November 13, Eurofiber France, a respected provider of fiber optic network and VPN solutions to many of France's leading companies, discovered that its systems had been compromised by criminal...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

