Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Cisco Talos researchers have detected an active wave of attacks using a new ransomware called Kraken. The group began operating in February 2025 and uses double-extortion methods, without targeting sp...

In the world of cybersecurity, firewalls are the first line of defense against cyber threats and attacks. Every day, businesses and home users are exposed to risks such as malware, ransomware, and una...

Fortinet has confirmed the discovery of a critical relative path vulnerability (CWE-23) in FortiWeb devices, identified as CVE-2025-64446 and registered as IR Number FG-IR-25-910 . The flaw, published...

The 15th Chinese National Games opened with a spectacle that combined sport and technology. Among the highlights were robots capable of playing ancient bronze instruments, artificial intelligence syst...

The cybersecurity landscape has accustomed us to constant upheavals. Every year new threats, new scenarios, and new criminal tactics emerge. But today, it’s not just technology that’s rede...
If you get an email saying you’re dead… it’s the new LastPass phishing scam
Vulnerable POS: Investigation into the hardware security of payment devices
ChatGPT Atlas: Researchers Discover How a Link Can Lead to Jailbreak
Malware alert: Critical WordPress plugin vulnerabilities actively exploited
ClayRat: The spyware that targets Android users with self-propagation
Be careful what you tell AI! It could be confidential data

If you get an email saying you’re dead… it’s the new LastPass phishing scam
Redazione RHC - October 29th, 2025
The developers of password manager LastPass have warned users of a large-scale phishing campaign that began in mid-October 2025. Attackers are sending emails containing fake requests for emergency access to...

Vulnerable POS: Investigation into the hardware security of payment devices
Redazione RHC - October 29th, 2025
Worldline payment terminals, widely used in Switzerland, have been exposed to an attack that allows anyone to gain complete control of the device in just a minute . The vulnerability...

ChatGPT Atlas: Researchers Discover How a Link Can Lead to Jailbreak
Redazione RHC - October 29th, 2025
NeuralTrust researchers have discovered a vulnerability in OpenAI's ChatGPT Atlas browser. This time, the attack vector is linked to the omnibox, the bar where users enter URLs or search queries....

Malware alert: Critical WordPress plugin vulnerabilities actively exploited
Redazione RHC - October 29th, 2025
Wordfence is raising the alarm about a large-scale malware campaign in which attackers are exploiting critical vulnerabilities in the popular WordPress plugins GutenKit and Hunk Companion . The company blocked...

ClayRat: The spyware that targets Android users with self-propagation
Redazione RHC - October 29th, 2025
The ClayRat spyware campaign is expanding rapidly and increasingly targeting Android users. According to Zimperium, the malware is actively spreading among Russian users through fake websites and Telegram channels, masquerading...

Be careful what you tell AI! It could be confidential data
Filippo Boni - October 29th, 2025
In an age where every question is answered with a simple tap, we users have perhaps gotten a little too comfortable with the new AI-based assistants. Ultimately, it makes little...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

