Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
320×100
Enterprise BusinessLog 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Cloudflare goes down in the magnificent cloud! Global incident is being resolved.
Di Redazione RHC - 18/11/2025

November 18, 2025 – After hours of widespread disruptions , the incident affecting Cloudflare’s global network finally appears to be nearing resolution. The company announced it has implemented a ...

Immagine del sito
IBM AIX: Two critical bugs allow execution of arbitrary commands (Score 10 and 9.6)
Di Redazione RHC - 18/11/2025

Two serious vulnerabilities in IBM’s AIX operating system could allow remote attackers to execute arbitrary commands on affected systems, prompting the company to issue important security updates. B...

Immagine del sito
Shakerati Anonimi: Nicoletta’s experience and the credit card thriller
Di Redazione RHC - 18/11/2025

The room is the same: dim lights, chairs in a circle, thermoses of herbal teas now cold from all the talking and venting. We are Shakerati Anonimi , a group of people who never imagined we’d end up ...

Immagine del sito
Apple ordered to pay $634 million to Masimo for patent infringement
Di Redazione RHC - 18/11/2025

Masimo, an American company that develops medical monitoring technologies, has won another round of litigation with Apple . A federal jury awarded it $634 million for infringing a patent on blood oxyg...

Immagine del sito
Microsoft Azure blocks a 15.72 terabit per second DDoS attack
Di Redazione RHC - 18/11/2025

A massive DDoS attack was neutralized by Microsoft Azure on October 24. A single endpoint located in Australia was targeted by the attack, which reached a maximum speed of 15.72 terabits per second (T...

Anatomy of a Data Theft: Technical Analysis of the “Formbook” Infostealer

In the cyber threat landscape, few malware programs are as persistent and widespread as Formbook . What began as a simple keylogger and form grabber h...
Redazione RHC - 27/10/2025 - 07:03

OpenAI is working on a neural network for music creation

According to The Information, OpenAI is actively working on its own neural network for music creation , which will compete with projects like Suno and...
Redazione RHC - 26/10/2025 - 17:41

Oracle VirtualBox Vulnerability: Risk of Virtual Machine Escape

BI.ZONE specialists have identified two vulnerabilities (CVE-2025-62592 and CVE-2025-61760) in Oracle VirtualBox. When combined, they allowed an attac...
Redazione RHC - 26/10/2025 - 16:33

YouTube Ghost Network: The phantom network that infected millions of users

Google specialists removed over 3,000 videos from YouTube that spread hidden information disguised as hacked software and video game cheats. Check Poi...
Redazione RHC - 26/10/2025 - 16:25

While Pope Francis is alive and continues his ministry, disinformation is rampant.

A survey conducted by the European Broadcasting Union (EBU), with support from the BBC, has highlighted that the most popular chatbots tend to distort...
Redazione RHC - 26/10/2025 - 09:45

New submarine cables in the Black Sea: Europe seeks digital independence from Russia

Eastern Europe is preparing for a new phase in telecommunications security. An ambitious submarine cable project, called Kardesa , will connect Bulgar...
Redazione RHC - 26/10/2025 - 09:21
1 40 41 42 43 44 246

Anatomy of a Data Theft: Technical Analysis of the “Formbook” Infostealer

- October 27th, 2025

In the cyber threat landscape, few malware programs are as persistent and widespread as Formbook . What began as a simple keylogger and form grabber has evolved into a powerful...

Facebook Linkedin X

OpenAI is working on a neural network for music creation

- October 26th, 2025

According to The Information, OpenAI is actively working on its own neural network for music creation , which will compete with projects like Suno and Udio. The publication's sources report...

Facebook Linkedin X

Oracle VirtualBox Vulnerability: Risk of Virtual Machine Escape

- October 26th, 2025

BI.ZONE specialists have identified two vulnerabilities (CVE-2025-62592 and CVE-2025-61760) in Oracle VirtualBox. When combined, they allowed an attacker to exit a virtual machine and reach the ARM-based macOS host system....

Facebook Linkedin X

YouTube Ghost Network: The phantom network that infected millions of users

- October 26th, 2025

Google specialists removed over 3,000 videos from YouTube that spread hidden information disguised as hacked software and video game cheats. Check Point researchers dubbed this campaign " YouTube Ghost Network"...

Facebook Linkedin X

While Pope Francis is alive and continues his ministry, disinformation is rampant.

- October 26th, 2025

A survey conducted by the European Broadcasting Union (EBU), with support from the BBC, has highlighted that the most popular chatbots tend to distort news , changing its meaning, confusing...

Facebook Linkedin X

New submarine cables in the Black Sea: Europe seeks digital independence from Russia

- October 26th, 2025

Eastern Europe is preparing for a new phase in telecommunications security. An ambitious submarine cable project, called Kardesa , will connect Bulgaria, Georgia, Turkey, and Ukraine without crossing Russian territorial...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE