Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Enterprise BusinessLog 320x200 1
2nd Edition GlitchZone RHC 970x120 2

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Risk averted for millions of Microsoft users! The critical vulnerability in Microsoft SharePoint 9.8
Di Redazione RHC - 21/11/2025

Microsoft has disclosed a critical vulnerability in SharePoint Online (discovered by RHC through our ongoing monitoring of critical CVEs on our portal), identified as CVE‑2025‑59245 , with a CVSS ...

Immagine del sito
MONOLOCK: The new “silent” ransomware group that rejects leak sites and affiliate panels.
Di Luca Stivali - 21/11/2025

The ransomware landscape is changing. The most exposed actors—LockBit, Hunters International, and Trigona—have paid the price for overexposure, including international operations, infiltrations, d...

Immagine del sito
Critical vulnerability in the WordPress plugin W3 Total Cache. 430,000 sites at risk!
Di Redazione RHC - 21/11/2025

A critical vulnerability, CVE-2025-9501, has been discovered in the popular WordPress plugin W3 Total Cache . This vulnerability allows the execution of arbitrary PHP commands on the server without au...

Immagine del sito
Happy birthday, Windows! 40 years of operating system history and still going strong.
Di Redazione RHC - 20/11/2025

Exactly 40 years ago, on November 20, 1985, Microsoft released Windows 1.0 , the first version of Windows, which attempted to transform the then-personal computer from a machine with a monotonous comm...

Immagine del sito
Multi-threaded Hacking: US Pioneers Automated Operations with AI Agents
Di Redazione RHC - 19/11/2025

In recent months, a new cyber operations infrastructure has been developing in the United States, in which automated agents are becoming not just a support tool, but a full-fledged participant in offe...

If you get an email saying you’re dead… it’s the new LastPass phishing scam

The developers of password manager LastPass have warned users of a large-scale phishing campaign that began in mid-October 2025. Attackers are sending...
Redazione RHC - 29/10/2025 - 09:03

Vulnerable POS: Investigation into the hardware security of payment devices

Worldline payment terminals, widely used in Switzerland, have been exposed to an attack that allows anyone to gain complete control of the device in j...
Redazione RHC - 29/10/2025 - 08:29

ChatGPT Atlas: Researchers Discover How a Link Can Lead to Jailbreak

NeuralTrust researchers have discovered a vulnerability in OpenAI's ChatGPT Atlas browser. This time, the attack vector is linked to the omnibox, the ...
Redazione RHC - 29/10/2025 - 08:02

Malware alert: Critical WordPress plugin vulnerabilities actively exploited

Wordfence is raising the alarm about a large-scale malware campaign in which attackers are exploiting critical vulnerabilities in the popular WordPres...
Redazione RHC - 29/10/2025 - 07:24

ClayRat: The spyware that targets Android users with self-propagation

The ClayRat spyware campaign is expanding rapidly and increasingly targeting Android users. According to Zimperium, the malware is actively spreading ...
Redazione RHC - 29/10/2025 - 07:15

Be careful what you tell AI! It could be confidential data

In an age where every question is answered with a simple tap, we users have perhaps gotten a little too comfortable with the new AI-based assistants. ...
Filippo Boni - 29/10/2025 - 06:58
1 40 41 42 43 44 249

If you get an email saying you’re dead… it’s the new LastPass phishing scam

- October 29th, 2025

The developers of password manager LastPass have warned users of a large-scale phishing campaign that began in mid-October 2025. Attackers are sending emails containing fake requests for emergency access to...

Facebook Linkedin X

Vulnerable POS: Investigation into the hardware security of payment devices

- October 29th, 2025

Worldline payment terminals, widely used in Switzerland, have been exposed to an attack that allows anyone to gain complete control of the device in just a minute . The vulnerability...

Facebook Linkedin X

ChatGPT Atlas: Researchers Discover How a Link Can Lead to Jailbreak

- October 29th, 2025

NeuralTrust researchers have discovered a vulnerability in OpenAI's ChatGPT Atlas browser. This time, the attack vector is linked to the omnibox, the bar where users enter URLs or search queries....

Facebook Linkedin X

Malware alert: Critical WordPress plugin vulnerabilities actively exploited

- October 29th, 2025

Wordfence is raising the alarm about a large-scale malware campaign in which attackers are exploiting critical vulnerabilities in the popular WordPress plugins GutenKit and Hunk Companion . The company blocked...

Facebook Linkedin X

ClayRat: The spyware that targets Android users with self-propagation

- October 29th, 2025

The ClayRat spyware campaign is expanding rapidly and increasingly targeting Android users. According to Zimperium, the malware is actively spreading among Russian users through fake websites and Telegram channels, masquerading...

Facebook Linkedin X

Be careful what you tell AI! It could be confidential data

- October 29th, 2025

In an age where every question is answered with a simple tap, we users have perhaps gotten a little too comfortable with the new AI-based assistants. Ultimately, it makes little...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE