Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The ransomware landscape is changing. The most exposed actors—LockBit, Hunters International, and Trigona—have paid the price for overexposure, including international operations, infiltrations, d...

A critical vulnerability, CVE-2025-9501, has been discovered in the popular WordPress plugin W3 Total Cache . This vulnerability allows the execution of arbitrary PHP commands on the server without au...

Exactly 40 years ago, on November 20, 1985, Microsoft released Windows 1.0 , the first version of Windows, which attempted to transform the then-personal computer from a machine with a monotonous comm...

In recent months, a new cyber operations infrastructure has been developing in the United States, in which automated agents are becoming not just a support tool, but a full-fledged participant in offe...

The scale of the leak, described by a team from the University of Vienna , demonstrates how dangerous the familiar contact search function of popular messaging apps can be. WhatsApp has always emphasi...
ClayRat: The spyware that targets Android users with self-propagation
Be careful what you tell AI! It could be confidential data
Europe vs. Silicon Valley: “AI First” kicks off in Turin with von der Leyen
“YOU ARE WORTH IT, YOU’RE NEVER TOO YOUNG TO CHANGE THE WORLD”: Nicola Bellotti’s vision
Gemini 3.0 Pro: What people who are trying it say
From Body to Screen: How Sexual Abuse Has Moved to the Digital World

ClayRat: The spyware that targets Android users with self-propagation
Redazione RHC - October 29th, 2025
The ClayRat spyware campaign is expanding rapidly and increasingly targeting Android users. According to Zimperium, the malware is actively spreading among Russian users through fake websites and Telegram channels, masquerading...

Be careful what you tell AI! It could be confidential data
Filippo Boni - October 29th, 2025
In an age where every question is answered with a simple tap, we users have perhaps gotten a little too comfortable with the new AI-based assistants. Ultimately, it makes little...

Europe vs. Silicon Valley: “AI First” kicks off in Turin with von der Leyen
Carlo Denza - October 28th, 2025
Von der Leyen launches "AI First" at Italian Tech Week: three obstacles to overcome and a €2 billion startup lost along the way. Turin, October 3, 2025. Before thousands of...

“YOU ARE WORTH IT, YOU’RE NEVER TOO YOUNG TO CHANGE THE WORLD”: Nicola Bellotti’s vision
Olivia Terragni - October 28th, 2025
We often try to explain the hybrid, simultaneous, and contradictory world in which young people live in perpetual connection, but the truth is that as adults, we struggle to understand...

Gemini 3.0 Pro: What people who are trying it say
Redazione RHC - October 28th, 2025
In recent days, a select few users have reported having access to the new Gemini 3.0 Pro model. Initial impressions suggest a significant improvement over the previous generation, so much...

From Body to Screen: How Sexual Abuse Has Moved to the Digital World
Paolo Galdieri - October 28th, 2025
This is the second in a series of articles analyzing gender-based violence in the digital context, in anticipation of November 25th, the International Day for the Elimination of Violence against...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

