Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Users noticed that last week Microsoft developers disabled the offline activation method for Windows 11 and 10 via KMS38, which has been used by hackers around the world for years. However, the offici...

Group-IB experts presented a detailed analysis of the long-running UNC2891 campaign, which demonstrated the continuing sophistication of ATM attack schemes. Attention focused on the Raspberry Pi, whic...

Israeli company NSO Group has appealed a California federal court ruling that bars it from using WhatsApp’s infrastructure to distribute its Pegasus surveillance software. The case, which has been o...

A vulnerability, designated CVE-2025-61757, was made public by Searchlight Cyber last Thursday. Company researchers discovered the issue and notified Oracle, which led to its disclosure. Oracle fixed ...

Microsoft has disclosed a critical vulnerability in SharePoint Online (discovered by RHC through our ongoing monitoring of critical CVEs on our portal), identified as CVE‑2025‑59245 , with a CVSS ...
Taiwan: Up to 7 years in prison for those who damage undersea cables
95% of companies believe they’re ready for ransomware. But only 15% actually are!
Cyber Incident Management in the NIS2 Era
US builds largest AI supercomputer in history
Microsoft 365 goes down: DNS anomaly paralyzes services worldwide
Tor Browser Says No to Artificial Intelligence! Security Comes First

Taiwan: Up to 7 years in prison for those who damage undersea cables
Redazione RHC - October 30th, 2025
Taipei, October 30, 2025 – Taiwan’s Legislative Yuan Economic Commission has approved the first reading of a series of amendments to the so-called “Seven Submarine Cable Laws,” introduced to address...

95% of companies believe they’re ready for ransomware. But only 15% actually are!
Redazione RHC - October 30th, 2025
Companies' widespread confidence in their cyber resilience is facing a new wave of threats, this time from artificial intelligence. According to the OpenText Cybersecurity 2025 Report, 95% of organizations worldwide...

Cyber Incident Management in the NIS2 Era
Giancarlo Di Lieto - October 30th, 2025
The NIS 2 Decree (Legislative Decree 138/2024), effective October 16, 2024, implements the principles of the European NIS2 Directive, laying the foundation for a more complex operational model of collaboration...

US builds largest AI supercomputer in history
Redazione RHC - October 30th, 2025
The U.S. Department of Energy (DOE) has entered into a strategic collaboration with Nvidia and Oracle to build seven next-generation AI-powered supercomputers , set to revolutionize scientific research and the...

Microsoft 365 goes down: DNS anomaly paralyzes services worldwide
Redazione RHC - October 29th, 2025
A DNS service outage was detected by Microsoft on October 29, 2025, impacting access to critical services such as Microsoft Azure and Microsoft 365. An anomaly was detected at 21:37...

Tor Browser Says No to Artificial Intelligence! Security Comes First
Redazione RHC - October 29th, 2025
Interestingly, while major companies like Microsoft and Google are actively adding AI features to their browsers, the Tor development team has chosen to remove them. @henry, a Tor project contributor,...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

