Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Cyber Offensive Fundamentals 970x120 V0.1

Latest news

Windows 11: Microsoft Revamps File Explorer with Artificial Intelligence Cyber News

Windows 11: Microsoft Revamps File Explorer with Artificial Intelligence

Microsoft has begun testing new AI-powered features in File Explorer in Windows 11. These features will allow users to interact...
Luca Vinciguerra - September 12, 2025
CISA launches new plan to improve CVE quality and global cyber defense Cyber News

CISA launches new plan to improve CVE quality and global cyber defense

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has presented the document "CISA Strategic Focus CVE Quality for a Cyber...
Silvia Felici - September 12, 2025
Microsoft Teams raises its defenses: real-time alerts against malicious links Cyber News

Microsoft Teams raises its defenses: real-time alerts against malicious links

To strengthen the security of its Teams platform, Microsoft will implement an automatic notification system to users regarding dangerous links...
Redazione RHC - September 12, 2025
Microsoft warns: Critical vulnerabilities in Office! Users and admins at risk Vulnerability

Microsoft warns: Critical vulnerabilities in Office! Users and admins at risk

On September 9, 2025, two significant vulnerabilities were discovered in Microsoft Office, for which dedicated patches were created. These vulnerabilities,...
Agostino Pellegrino - September 12, 2025
Google fights misinformation: C2PA arrives on Pixel and Photos for AI image recognition. Cyber News

Google fights misinformation: C2PA arrives on Pixel and Photos for AI image recognition.

Google announced that it will integrate C2PA Content Credentials technology into the Pixel 10 camera app and Google Photos to...
Redazione RHC - September 12, 2025
SpamGPT is here! The new phishing kit that combines AI, spam, and diabolical genius. Cyber News

SpamGPT is here! The new phishing kit that combines AI, spam, and diabolical genius.

A new tool called SpamGPT has appeared on underground forums and has quickly become a hot topic in the cybersecurity...
Pietro Melillo - September 11, 2025
Critical authentication bypass bug affects Sophos AP6 Cyber News

Critical authentication bypass bug affects Sophos AP6

Sophos has announced that it has fixed a critical authentication bypass vulnerability affecting its AP6 series wireless access points. The...
Agostino Pellegrino - September 11, 2025
An RCE in Apple CarPlay allows root access to vehicle infotainment systems Vulnerability

An RCE in Apple CarPlay allows root access to vehicle infotainment systems

At the DefCon security conference, researchers presented a significant exploit chain that allows attackers to gain administrator permissions for vehicle...
Agostino Pellegrino - September 11, 2025
A bug in Google Drive allows access to other people’s files on shared desktops. Cybercrime

A bug in Google Drive allows access to other people’s files on shared desktops.

Millions of people and businesses rely on Google Drive to store contracts, reports, photos, and work documents, using the Windows...
Stefano Gazzella - September 11, 2025
Critical BitLocker Vulnerabilities: Microsoft Patches Two Security Holes Cyber News

Critical BitLocker Vulnerabilities: Microsoft Patches Two Security Holes

Two significant elevation of privilege vulnerabilities affecting Windows BitLocker encryption have been addressed by Microsoft. These flaws, identified as CVE-2025-54911...
Massimiliano Brolli - September 11, 2025
LockBit 5.0: concrete signs of a possible rebirth? Cybercrime

LockBit 5.0: concrete signs of a possible rebirth?

The ransomware landscape continues to be characterized by dynamics of adaptation and resilience. Even when an international operation seems to...
Pietro Melillo - September 11, 2025
Critical vulnerability in Adobe Commerce and Magento: the SessionReaper bug Cyber News

Critical vulnerability in Adobe Commerce and Magento: the SessionReaper bug

Adobe has reported a critical bug (CVE-2025-54236) affecting the Commerce and Magento platforms. Researchers have called this vulnerability SessionReaper and...
Agostino Pellegrino - September 10, 2025

12.5 million HD movies per second! Amazon’s undersea cable will connect the US to Ireland.

In a few years, Ireland and the United States will be connected by an undersea communications cable designed to help Amazon improve its AWS services. Undersea cables are a vital...

They told you 6G would be fast, right? But they didn’t tell you the whole truth

It's not “ just faster ”: 6G changes the very nature of the network! When we talk about 6G, we risk reducing everything to a speed upgrade, as if the...

Apache OpenOffice under ransomware attack, but the foundation disputes

The Apache OpenOffice project has come under scrutiny after the Akira ransomware group claimed to have carried out a cyberattack and stolen 23 gigabytes of internal data. However, the organization...

Notepad++ under attack! How a fake DLL opens the door to criminal hackers

A new vulnerability affecting Notepad++ was released in September. The vulnerability has been identified as CVE-2025-56383, and details can be found on the NIST website. CVE-2025-56383 is a DLL hijacking...

Microsoft warns: Security updates cause problems with BitLocker

Microsoft has issued an urgent warning to Windows operating system users regarding a potential issue that, starting with security updates distributed on October 14, 2025, could cause some devices to...

A dangerous zero-day zero-click exploit threatens billions of Android devices

Google has issued an urgent advisory regarding a critical vulnerability in Android that allows attackers to execute arbitrary code on the device without any user interaction. The Zero Click vulnerability...

Is the era of paywalls over? Smart browsers circumvent them, and controlling them is very difficult

How can publishers protect themselves from AI-powered "smart" browsers if they look like ordinary users? The emergence of new AI-powered "smart" browsers is challenging traditional methods of protecting online content....

CISA Warns! New Bugs in Gladinet, Control Web Panel, and WordPress Expose Systems

Two vulnerabilities related to Gladinet and Control Web Panel (CWP) have been added to the U.S. Cybersecurity and Infrastructure Security Agency (CISA) catalog of known exploited vulnerabilities (KEVs), due to...

Louvre Theft: Windows 2000 and Windows XP on Networks, as Well as Simple Passwords

As we know, the thieves in the "theft of the century" entered through a second-floor window of the Louvre Museum, but the museum had other problems besides unprotected windows. Although...

Cyberstalking Against Women: Analysis and Legal Implications

This is the third in a series of articles analyzing gender-based violence in the digital context, in anticipation of November 25th, the International Day for the Elimination of Violence against...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE