Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Ancharia Mobile 1
970x20 Itcentric

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Risk averted for millions of Microsoft users! The critical vulnerability in Microsoft SharePoint 9.8
Di Redazione RHC - 21/11/2025

Microsoft has disclosed a critical vulnerability in SharePoint Online (discovered by RHC through our ongoing monitoring of critical CVEs on our portal), identified as CVE‑2025‑59245 , with a CVSS ...

Immagine del sito
MONOLOCK: The new “silent” ransomware group that rejects leak sites and affiliate panels.
Di Luca Stivali - 21/11/2025

The ransomware landscape is changing. The most exposed actors—LockBit, Hunters International, and Trigona—have paid the price for overexposure, including international operations, infiltrations, d...

Immagine del sito
Critical vulnerability in the WordPress plugin W3 Total Cache. 430,000 sites at risk!
Di Redazione RHC - 21/11/2025

A critical vulnerability, CVE-2025-9501, has been discovered in the popular WordPress plugin W3 Total Cache . This vulnerability allows the execution of arbitrary PHP commands on the server without au...

Immagine del sito
Happy birthday, Windows! 40 years of operating system history and still going strong.
Di Redazione RHC - 20/11/2025

Exactly 40 years ago, on November 20, 1985, Microsoft released Windows 1.0 , the first version of Windows, which attempted to transform the then-personal computer from a machine with a monotonous comm...

Immagine del sito
Multi-threaded Hacking: US Pioneers Automated Operations with AI Agents
Di Redazione RHC - 19/11/2025

In recent months, a new cyber operations infrastructure has been developing in the United States, in which automated agents are becoming not just a support tool, but a full-fledged participant in offe...

Goodbye, malware! In 2025, criminal hackers will use legitimate accounts to remain invisible.

A FortiGuard report for the first half of 2025 shows that financially motivated attackers are increasingly eschewing sophisticated exploits and malwar...
Redazione RHC - 04/11/2025 - 07:22

Cyberstalking Against Women: Analysis and Legal Implications

This is the third in a series of articles analyzing gender-based violence in the digital context, in anticipation of November 25th, the International ...
Paolo Galdieri - 04/11/2025 - 07:07

WSUS security update has broken hotpatches on Windows Server 2025

A breakthrough patch fixed a security flaw in the Windows Server Update Service (WSUS), but apparently caused hotpatching to stop working on certain W...
Redazione RHC - 03/11/2025 - 22:47

Hanyuan-1: China’s room-temperature quantum computer challenges the US

China's first atomic quantum computer has reached a major commercial milestone, recording its first sales to domestic and international customers, acc...
Redazione RHC - 03/11/2025 - 22:32

Inside NVIDIA: Jensen Huang leads 36 managers, 36,000 employees, and reads 20,000 emails a day

NVIDIA CEO Jen-Hsun Huang now directly oversees 36 employees across seven key areas: strategy, hardware, software, artificial intelligence, public rel...
Redazione RHC - 03/11/2025 - 16:56

Userbox shut down and its admin arrested by Moscow police. Something is changing.

In recent months, it would appear that the Russian Federation is cracking down on cybercrime, a departure from what we were used to seeing in the past...
Redazione RHC - 03/11/2025 - 16:38
1 31 32 33 34 35 249

Goodbye, malware! In 2025, criminal hackers will use legitimate accounts to remain invisible.

- November 4th, 2025

A FortiGuard report for the first half of 2025 shows that financially motivated attackers are increasingly eschewing sophisticated exploits and malware. Instead , they are using valid accounts and legitimate...

Facebook Linkedin X

Cyberstalking Against Women: Analysis and Legal Implications

- November 4th, 2025

This is the third in a series of articles analyzing gender-based violence in the digital context, in anticipation of November 25th, the International Day for the Elimination of Violence against...

Facebook Linkedin X

WSUS security update has broken hotpatches on Windows Server 2025

- November 3rd, 2025

A breakthrough patch fixed a security flaw in the Windows Server Update Service (WSUS), but apparently caused hotpatching to stop working on certain Windows Server 2025 servers. Microsoft Hotpatch is...

Facebook Linkedin X

Hanyuan-1: China’s room-temperature quantum computer challenges the US

- November 3rd, 2025

China's first atomic quantum computer has reached a major commercial milestone, recording its first sales to domestic and international customers, according to state media. The Hubei Daily, a state-run newspaper...

Facebook Linkedin X

Inside NVIDIA: Jensen Huang leads 36 managers, 36,000 employees, and reads 20,000 emails a day

- November 3rd, 2025

NVIDIA CEO Jen-Hsun Huang now directly oversees 36 employees across seven key areas: strategy, hardware, software, artificial intelligence, public relations, networking, and executive assistants. This represents a significant shift from...

Facebook Linkedin X

Userbox shut down and its admin arrested by Moscow police. Something is changing.

- November 3rd, 2025

In recent months, it would appear that the Russian Federation is cracking down on cybercrime, a departure from what we were used to seeing in the past , when many...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE