Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The underground cybercrime market continues to evolve rapidly, fueled by specialized groups designing and selling tools for increasingly sophisticated digital scams. Among these, a particularly active...

American aviation and defense components manufacturer ADC Aerospace has found itself in the spotlight due to a possible cyber attack by the Play ransomware group, which appeared on their blog where cr...

This article analyzes the disclosure submitted to Microsoft and available in English on digitaldefense , where images, demonstration videos and a Python code example are available. In recent years, di...

Airbus has announced the recall of approximately 6,500 A320 aircraft due to potential failures in the ELAC control system caused by powerful solar flares. The recall followed a sudden loss of altitude...

Italian defense company Leonardo has unveiled its new Michelangelo Dome system . According to the company, it is designed to counter hypersonic missiles and mass drone attacks . During the technical p...
Undersea Cables, the New Hybrid War: Jaroslav Nad’s Alarm
Apache OpenOffice under ransomware attack, but the foundation disputes
Microsoft Exchange Server Penetration Testing: Techniques, Tools, and Countermeasures
Notepad++ under attack! How a fake DLL opens the door to criminal hackers
Microsoft warns: Security updates cause problems with BitLocker
A dangerous zero-day zero-click exploit threatens billions of Android devices

Undersea Cables, the New Hybrid War: Jaroslav Nad’s Alarm
Redazione RHC - November 5th, 2025
Taiwan is critically dependent on its undersea infrastructure, which is essential for communications and power supply . In recent years, however, there have been a series of incidents of damage...

Apache OpenOffice under ransomware attack, but the foundation disputes
Redazione RHC - November 5th, 2025
The Apache OpenOffice project has come under scrutiny after the Akira ransomware group claimed to have carried out a cyberattack and stolen 23 gigabytes of internal data. However, the organization...

Microsoft Exchange Server Penetration Testing: Techniques, Tools, and Countermeasures
Alessandro Molinari - November 5th, 2025
Often, during penetration testing, we find ourselves with elevated access (Domain Admin) within an organization. Some companies stop there, thinking that obtaining Domain Admin is the ultimate goal. But it's...

Notepad++ under attack! How a fake DLL opens the door to criminal hackers
Manuel Roccon - November 5th, 2025
A new vulnerability affecting Notepad++ was released in September. The vulnerability has been identified as CVE-2025-56383, and details can be found on the NIST website. CVE-2025-56383 is a DLL hijacking...

Microsoft warns: Security updates cause problems with BitLocker
Redazione RHC - November 4th, 2025
Microsoft has issued an urgent warning to Windows operating system users regarding a potential issue that, starting with security updates distributed on October 14, 2025, could cause some devices to...

A dangerous zero-day zero-click exploit threatens billions of Android devices
Redazione RHC - November 4th, 2025
Google has issued an urgent advisory regarding a critical vulnerability in Android that allows attackers to execute arbitrary code on the device without any user interaction. The Zero Click vulnerability...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

