Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Enterprise BusinessLog 320x200 1
Crowdstriker 970×120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Critical RCE exploit in Microsoft WSUS actively exploited. CISA warns: imminent risk
Di Redazione RHC - 25/10/2025

A global alert has been issued by the United States Cybersecurity and Infrastructure Security Agency (CISA) regarding the active exploitation of a critical remote code execution (RCE) flaw in Microsof...

Immagine del sito
No flesh, no bones, just code! Channel 4’s first AI presenter arrives.
Di Redazione RHC - 24/10/2025

On Monday 20 October, Channel 4 broadcast a full-length documentary hosted by a creative TV presenter powered entirely by artificial intelligence. ” I’m not real. For the first time on a B...

Immagine del sito
Russia and Cybercrime: A Balance Between Selective Repression and State Interest
Di Ada Spinelli - 24/10/2025

The Russian cybercrime ecosystem has entered a phase of profound transformation, triggered by a combination of factors: unprecedented international pressure from law enforcement agencies, a shift in d...

Immagine del sito
Hackers can access Microsoft Teams chats and emails using access tokens
Di Redazione RHC - 24/10/2025

A recent discovery has revealed that hackers can exploit a flaw in Microsoft Teams on Windows to obtain encrypted authentication tokens , which grant unauthorized access to chats, emails, and files st...

Immagine del sito
FIA website hacked: personal data of Max Verstappen and over 7,000 drivers exposed
Di Redazione RHC - 24/10/2025

Security researchers have discovered vulnerabilities in an FIA website that contained sensitive personal information and documents relating to drivers, including world champion Max Verstappen. Ian Car...

And the drones are going to hell! The anti-drone technology developed by the USA

The American company Epirus has provided an impressive demonstration of its Leonidas microwave defense system, designed to combat drones. At the Camp ...
Redazione RHC - 03/10/2025 - 07:17

Microsoft goes all out with shoes! They’ve launched collectible Windows XP-themed Crocs

This year, Microsoft celebrates its first 50 years, a milestone that reflects the company's transformation from a small startup in 1975 to a global te...
Redazione RHC - 02/10/2025 - 18:05

The future of submarine cables: 48% longer by 2040. Are we really ready?

The undersea cables connecting the UK to the outside world are vital to the country, with transactions amounting to £220 billion every day. The Joint ...
Redazione RHC - 02/10/2025 - 17:06

Klopatra Arrives! The Banking Trojan That Threatens Android Users

An Android banking Trojan and RAT called Klopatra masquerades as an IPTV and VPN app and has already infected over 3,000 devices . The malware is a Tr...
Redazione RHC - 02/10/2025 - 16:14

Data Act: Yet another regulation? Yes. But this one really changes the game (even for those in security).

Every time Brussels churns out a new acronym, someone in the company snorts: "More paper?" It happens. But the Data Act isn't just a stamp to add to t...
Sandro Sana - 02/10/2025 - 16:08

Google Drive defends itself from ransomware! AI blocks attacks

Google has unveiled a new AI tool for Drive for desktop. The model is said to have been trained on millions of real-world ransomware samples and can s...
Redazione RHC - 02/10/2025 - 13:08
1 32 33 34 35 36 204

And the drones are going to hell! The anti-drone technology developed by the USA

- October 3rd, 2025

The American company Epirus has provided an impressive demonstration of its Leonidas microwave defense system, designed to combat drones. At the Camp Atterbury test site in Indiana, the system was...

Facebook Linkedin X

Microsoft goes all out with shoes! They’ve launched collectible Windows XP-themed Crocs

- October 2nd, 2025

This year, Microsoft celebrates its first 50 years, a milestone that reflects the company's transformation from a small startup in 1975 to a global technology giant. Founded by Bill Gates...

Facebook Linkedin X

The future of submarine cables: 48% longer by 2040. Are we really ready?

- October 2nd, 2025

The undersea cables connecting the UK to the outside world are vital to the country, with transactions amounting to £220 billion every day. The Joint Committee on National Security Strategy...

Facebook Linkedin X

Klopatra Arrives! The Banking Trojan That Threatens Android Users

- October 2nd, 2025

An Android banking Trojan and RAT called Klopatra masquerades as an IPTV and VPN app and has already infected over 3,000 devices . The malware is a Trojan capable of...

Facebook Linkedin X

Data Act: Yet another regulation? Yes. But this one really changes the game (even for those in security).

- October 2nd, 2025

Every time Brussels churns out a new acronym, someone in the company snorts: "More paper?" It happens. But the Data Act isn't just a stamp to add to the binder:...

Facebook Linkedin X

Google Drive defends itself from ransomware! AI blocks attacks

- October 2nd, 2025

Google has unveiled a new AI tool for Drive for desktop. The model is said to have been trained on millions of real-world ransomware samples and can suspend syncing to...

Facebook Linkedin X
Most Read Articles of the Month Most Read Articles of the Week
  1. Google launches Gemini 3.0 Pro: new multimodal language model
  2. The Truth About Windows XP License Key: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8
  3. Google Announces Gemini 3.0: Artificial Intelligence Evolves Toward AGI
  4. Computer science graduates with no future! Thousands of resumes ignored, and goodbye to six-figure salaries.
  5. With 50 dollars and physical access to the server, the Cloud goes to hell
  1. Google launches Gemini 3.0 Pro: new multimodal language model
  2. Google Announces Gemini 3.0: Artificial Intelligence Evolves Toward AGI
  3. Critical vulnerability in Windows SMB client: CISA raises alarm
  4. NIS2 and new ACN guidelines: what changes for companies and how to prepare
  5. ChatGPT writes the perfect scam… but the scammer leaves the AI instructions inside.

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE