Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Ancharia Mobile 1
TM RedHotCyber 970x120 042543

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

US Brothers Accused of Destroying 96 Databases with AI Cybercrime

US Brothers Accused of Destroying 96 Databases with AI

The U.S. Department of Justice has accused twin brothers Muneeb and Sohaib Akhter of deleting 96 databases containing sensitive information,...
Redazione RHC - 8 December 2025
US Seizes Phishing Site Used by Myanmar Scammers to Steal Millions Cybercrime

US Seizes Phishing Site Used by Myanmar Scammers to Steal Millions

The U.S. Department of Justice has announced the shutdown of a phishing website used by scammers in Myanmar to steal...
Redazione RHC - 8 December 2025
Digital Literacy in Schools: The Key to Unlocking Students’ Potential Cybercrime

Digital Literacy in Schools: The Key to Unlocking Students’ Potential

According to Eurostat, in 2023 only 55% of European Union citizens aged 16 to 74 had at least basic digital...
Inva Malaj - 8 December 2025
OSINT Investigation: Uncovering Digital Evidence Cybercrime

OSINT Investigation: Uncovering Digital Evidence

We live in an age of almost mandatory transparency, an age in which every single digital action we take, be...
Alexandro Irace - 8 December 2025
Europe’s Digital Sovereignty: The Risks of Relying on Non-European Tech Cybercrime

Europe’s Digital Sovereignty: The Risks of Relying on Non-European Tech

In recent months, two seemingly unrelated events have highlighted an uncomfortable truth: Europe no longer controls its own digital infrastructure...
Redazione RHC - 7 December 2025
Apple’s Major Shake-Up: Johny Srouji Leaves as Senior VP of Hardware Technologies Cybercrime

Apple’s Major Shake-Up: Johny Srouji Leaves as Senior VP of Hardware Technologies

Apple is going through a period of major leadership changes , with the departure of key figures who have contributed...
Redazione RHC - 7 December 2025

Critical Vulnerability in Azure Bastion Scores 10! When RDP and SSH in the Cloud Are Checkmated

An authentication bypass vulnerability has been discovered in Azure Bastion , Microsoft's managed service that enables secure RDP and SSH connections to virtual machines in Azure without directly exposing them...
Share on Facebook Share on LinkedIn Share on X

Risk averted for millions of Microsoft users! The critical vulnerability in Microsoft SharePoint 9.8

Microsoft has disclosed a critical vulnerability in SharePoint Online (discovered by RHC through our ongoing monitoring of critical CVEs on our portal), identified as CVE‑2025‑59245 , with a CVSS v3.1...
Share on Facebook Share on LinkedIn Share on X

Sturnus, the banking Trojan that intercepts WhatsApp, Telegram, and Signal messages

ThreatFabric specialists have discovered a new banking Trojan, Sturnus . The malware is capable of intercepting messages from end-to-end encrypted messaging apps (Signal, WhatsApp, Telegram) and gaining full control over...
Share on Facebook Share on LinkedIn Share on X

Disloyal Employees: Fired, Returns to Work, and Resets 2,500 Passwords Without the Company’s Knowledge

An employee has pleaded guilty to hacking into his former employer's network and causing nearly $1 million in damages after being fired. According to the indictment, 35-year-old Maxwell Schultz, who...
Share on Facebook Share on LinkedIn Share on X

MONOLOCK: The new “silent” ransomware group that rejects leak sites and affiliate panels.

The ransomware landscape is changing. The most exposed actors—LockBit, Hunters International, and Trigona—have paid the price for overexposure, including international operations, infiltrations, deliberate leaks, and operational collapses. After years dominated...
Share on Facebook Share on LinkedIn Share on X

Critical vulnerability in the WordPress plugin W3 Total Cache. 430,000 sites at risk!

A critical vulnerability, CVE-2025-9501, has been discovered in the popular WordPress plugin W3 Total Cache . This vulnerability allows the execution of arbitrary PHP commands on the server without authentication....
Share on Facebook Share on LinkedIn Share on X

Hundreds of robots on the march: China presents the new generation of humanoids

Shenzhen -based UBTECH Robotics has publicly demonstrated its new wave of humanoid robots, delivering several hundred of them in a single shipment. The announcement was accompanied by a video that...
Share on Facebook Share on LinkedIn Share on X

Veeam launches Data Platform v13, redefining the standard for cyber resilience and advanced data protection.

With new capabilities to stay ahead of threats and accelerate recovery with next-generation security, forensic insights and intelligent automation, Veeam also launches the Universal Hypervisor Integration API, a flexible integration...
Share on Facebook Share on LinkedIn Share on X

Happy birthday, Windows! 40 years of operating system history and still going strong.

Exactly 40 years ago, on November 20, 1985, Microsoft released Windows 1.0 , the first version of Windows, which attempted to transform the then-personal computer from a machine with a...
Share on Facebook Share on LinkedIn Share on X

World Children’s Day: Children live in digital, but digital wasn’t designed for them.

Today is World Children's Day, established by the UN on November 20 to commemorate two fundamental acts: the 1959 Declaration of the Rights of the Child and, thirty years later,...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Veeam Backup Vulnerability: Critical RCE Flaw Discovered – Update Now
Redazione RHC - 08/01/2026

Backups are generally considered the last line of defense, but this week Veeam reminded us that backup systems themselves can become entry points for attacks. The company released security updates for Backup & Replication ,…

Immagine del sitoCybercrime
When Attack Discovery Becomes Automated, Detection Stops Scaling
Alexander Rogan - 08/01/2026

For much of the past two decades, cybersecurity has been built on a simple assumption: malicious activity can be detected, analysed, and responded to before meaningful damage occurs. This assumption shaped everything from SOC design…

Immagine del sitoCybercrime
CVE-2026-21858: n8n Vulnerability Exposes Thousands of Servers to RCE
Redazione RHC - 08/01/2026

The vulnerability, identified as CVE-2026-21858, which we recently reported on, affects approximately 100,000 servers worldwide, threatening to expose proprietary API keys, customer databases, and AI workflows. The vulnerability, with a CVSS score of 10, has…

Immagine del sitoCybercrime
Disable Windows 11 AI Features Easily with RemoveWindowsAI Tool
Redazione RHC - 07/01/2026

A new open-source script allows Windows 11 users to widely disable the operating system’s built-in artificial intelligence features . The project, developed by Zoicware , is called RemoveWindowsAI and aims to offer greater control over…

Immagine del sitoCybercrime
DevSecOps: Integrating Security into Your Development Process
Massimiliano Brolli - 07/01/2026

When it comes to application security, there’s rarely a single problem. It’s almost always a chain of small flaws, poor decisions, and missing controls that, when added together, pave the way for serious incidents. This…