Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

RHC interviews ShinyHunters: “Systems can be repaired, but people remain vulnerable!”
Di RHC Dark Lab - 17/09/2025

ShinyHunters is a group of threat actors that gained notoriety after the massive data breach against Salesforce, an incident that led Google to closely monitor them and assign them the code name UNC62...

The Great Firewall in the Spotlight: The Leak Revealing the Industrialization of Chinese Censorship
Di Redazione RHC - 16/09/2025

Edited by Luca Stivali and Olivia Terragni. On September 11, 2025, what can be defined as the largest leak ever suffered by the Great Firewall of China (GFW) exploded in the media, massively and massi...

OpenAI and Microsoft reach agreement to transform into a public utility company.
Di Redazione RHC - 13/09/2025

OpenAI has entered into a memorandum of understanding with Microsoft to review its partnership, which could lead to the company’s transformation into a Public Benefit Corporation (PBC). If the trans...

Goodbye PowerShell 2.0 and WMIC! The great Windows 11 cleanup has begun.
Di Redazione RHC - 12/09/2025

Windows 11 users who have installed the September 2025 Update might think that practically nothing changes. At first glance, KB5065426 looks like a normal small patch that Microsoft distributes to eve...

Looking for Volodymyr Tymoshchuk! 11 million dollars for the Nefilim hacker
Di Redazione RHC - 12/09/2025

The U.S. Department of Justice has indicted Ukrainian Volodymyr Tymoshchuk on seven counts of computer hacking and extortion. He is considered one of the most dangerous hackers of recent years. The in...

Let the hunt begin! Hackers exploit Citrix flaw to infiltrate global systems

A critical zero-day flaw, classified as CVE-2025-6543, has been discovered in Citrix NetScaler systems. This vulnerability has been actively exploited...
Redazione RHC - 30/08/2025 - 20:30

The Pentagon launches an audit of Microsoft. It investigates Chinese engineers and alleged backdoors.

The Pentagon has sent a "letter of concern" to Microsoft documenting a "breach of trust" regarding the company's use of Chinese engineers to maintain ...
Redazione RHC - 30/08/2025 - 17:06

Amazon Stops APT29: Sophisticated Russian Watering Hole Campaign Foiled

A complex watering hole campaign, orchestrated by the notorious hacker group APT29, linked to Russian foreign intelligence services, was neutralized b...
Redazione RHC - 30/08/2025 - 15:58

The best defense is a good offense! Google is ready to launch cyber attacks against criminal hackers.

Google is poised to adopt a more proactive stance to protect itself and potentially other U.S. organizations from cyberattacks, with the company sugge...
Redazione RHC - 30/08/2025 - 13:57

A zero-click exploit for WhatsApp allowed remote surveillance. Meta warns victims.

A security flaw in WhatsApp's messaging apps for Apple iOS and macOS has been patched, the company reported, after likely being widely exploited along...
Redazione RHC - 30/08/2025 - 10:56

Google warns 2.5 billion Gmail users: account security at risk. Reset your password!

A far-reaching security advisory has been issued by Google to the 2.5 billion users of its Gmail service, aiming to strengthen the protection of their...
Redazione RHC - 30/08/2025 - 10:39
1 30 31 32 33 34 147

Let the hunt begin! Hackers exploit Citrix flaw to infiltrate global systems

- August 30th, 2025

A critical zero-day flaw, classified as CVE-2025-6543, has been discovered in Citrix NetScaler systems. This vulnerability has been actively exploited by malicious hackers since May 2025, several months before a...

  

The Pentagon launches an audit of Microsoft. It investigates Chinese engineers and alleged backdoors.

- August 30th, 2025

The Pentagon has sent a "letter of concern" to Microsoft documenting a "breach of trust" regarding the company's use of Chinese engineers to maintain sensitive government computer systems, Defense Secretary...

  

Amazon Stops APT29: Sophisticated Russian Watering Hole Campaign Foiled

- August 30th, 2025

A complex watering hole campaign, orchestrated by the notorious hacker group APT29, linked to Russian foreign intelligence services, was neutralized by Amazon's cybersecurity team. This latest campaign marks a significant...

  

The best defense is a good offense! Google is ready to launch cyber attacks against criminal hackers.

- August 30th, 2025

Google is poised to adopt a more proactive stance to protect itself and potentially other U.S. organizations from cyberattacks, with the company suggesting it may assume the role of attacker...

  

A zero-click exploit for WhatsApp allowed remote surveillance. Meta warns victims.

- August 30th, 2025

A security flaw in WhatsApp's messaging apps for Apple iOS and macOS has been patched, the company reported, after likely being widely exploited alongside a recently discovered Apple vulnerability in...

  

Google warns 2.5 billion Gmail users: account security at risk. Reset your password!

- August 30th, 2025

A far-reaching security advisory has been issued by Google to the 2.5 billion users of its Gmail service, aiming to strengthen the protection of their accounts following a data breach...

  

Sign up for the newsletter