Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Fortinet 320x100px
970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Windows 11 Password Issue: Microsoft Warns of Invisible Icon Bug

Microsoft has warned users of a Windows 11 glitch: after the release of updates starting in August 2025 , the...
Redazione RHC - 30 November 2025

CISA Warns of OpenPLC ScadaBR Vulnerability Exploitation

The Cybersecurity and Infrastructure Security Agency (CISA) has expanded its list of exploited vulnerabilities (KEVs), reporting a new vulnerability affecting...
Redazione RHC - 30 November 2025

The Power of A* Algorithm in Artificial Intelligence and Robotics

Nearly everything artificial intelligence does today is based on a simple but fundamental idea: any problem can be reduced to...
Redazione RHC - 30 November 2025

WhatsApp Messages Contain Hidden GPS Data, Expert Warns

According to computer forensics expert Elom Daniel, WhatsApp messages can contain hidden geolocation data even when the user hasn't intentionally...
Redazione RHC - 30 November 2025

DeepSeekMath-V2 Revolutionizes Math with AI-Powered Proof Verification

The Chinese company DeepSeek has introduced a new specialized model for solving mathematical problems , DeepSeekMath-V2. This large-scale language model,...
Redazione RHC - 30 November 2025

Shai-Hulud Attack: npm Supply Chain Compromised Again

The npm ecosystem is once again at the center of a large-scale supply chain attack attributed to the Shai-Hulud campaign....
Redazione RHC - 30 November 2025

Did they give you a digital photo frame? It’s more than just family memories.

Researchers have discovered several critical vulnerabilities in Uhale digital picture frames running Android , with some models even downloading and executing malware during startup. They examined the Uhale app and...
Share on Facebook Share on LinkedIn Share on X

What are PsyOps? Exploring mind manipulation in the digital age.

Psychological operations, commonly known as PsyOps, are a significant and often poorly understood element of military and security strategy . These operations involve the use of psychological tactics to influence...
Share on Facebook Share on LinkedIn Share on X

Understanding Firewalls: The First Line of Defense in Cybersecurity

In the world of cybersecurity, firewalls are the first line of defense against cyber threats and attacks. Every day, businesses and home users are exposed to risks such as malware,...
Share on Facebook Share on LinkedIn Share on X

Critical Vulnerability in FortiWeb: Fortinet and CISA Recommend Urgent Updates

Fortinet has confirmed the discovery of a critical relative path vulnerability (CWE-23) in FortiWeb devices, identified as CVE-2025-64446 and registered as IR Number FG-IR-25-910 . The flaw, published on November...
Share on Facebook Share on LinkedIn Share on X

China’s New Era of Robots: Shenzhen at the Center of the Technological Revolution

The 15th Chinese National Games opened with a spectacle that combined sport and technology. Among the highlights were robots capable of playing ancient bronze instruments, artificial intelligence systems capable of...
Share on Facebook Share on LinkedIn Share on X

IndonesianFoods: The Worm That’s Wreaking Havoc on npm and Created 100,000 Packages

A self-propagating worm, named IndonesianFoods , has been discovered in npm . It generates new packets every seven seconds. According to Sonatype, the malware has already created over 100,000 packets...
Share on Facebook Share on LinkedIn Share on X

Vibe-Hacking: The New Frontier of Criminal Cybersecurity

The cybersecurity landscape has accustomed us to constant upheavals. Every year new threats, new scenarios, and new criminal tactics emerge. But today, it's not just technology that's redefining the rules...
Share on Facebook Share on LinkedIn Share on X

Two-Factor Authentication and MFA: Protect Your Accounts in 3 Easy Steps!

Two-factor authentication (2FA) , or more commonly, Multi-Factor Authentication (MFA) , is an effective solution for protecting our online accounts. With the rise of cyberattacks and identity theft, it's crucial...
Share on Facebook Share on LinkedIn Share on X

John von Neumann: The Multifaceted Genius of 20th-Century Science

We meet the man considered one of the most multifaceted and brilliant scientists of the last century, perhaps equal only to Einstein. He possessed a wide range of scientific talents,...
Share on Facebook Share on LinkedIn Share on X

The Wayback Machine “of souls” is coming soon. And so are the controversies

Many of us grew up with Hiroshi Shiba, from Jeeg the steel robot who talked to his late father, Professor Senjiro Shiba, a scientist and archaeologist inside a large computer....
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sito
Critical MongoDB Vulnerability Exposed: CVE-2025-14847
Redazione RHC - 23/12/2025

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…

Immagine del sito
RansomHouse Ransomware Upgraded: Enhanced Encryption Threat
Redazione RHC - 22/12/2025

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…

Immagine del sito
Cyber Attacks on the Rise: Wiper Malware and Data Destruction in 2025
Redazione RHC - 22/12/2025

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers use wipers, destructive tools that…

Immagine del sito
MS13-089 Ransomware: Double Extortion Without Encryption
Inva Malaj - 22/12/2025

MS13-089 opens a leak site on the dark web, exposes the first data and adopts a double extortion strategy without encryption. A brand built on an old Microsoft ID For years, “MS13-089” identified a 2013…

Immagine del sito
Microsoft Shifts Activation Process: What It Means for Air-Gapped Systems
Redazione RHC - 22/12/2025

In the past, many users and system administrators have relied on Microsoft’s telephone activation service to manage installations in specific contexts. During the Windows 8 era, MAK ( Multiple Activation Key) licenses were widely available.…