Welcome to Red Hot Cyber | Cybersecurity News
Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
320x100 Itcentric
LECS 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Top 25 Software Vulnerabilities 2025: MITRE CWE Ranking and Security Tips
Di Redazione RHC - 13/12/2025

MITRE has released its ranking of the 25 most dangerous software vulnerabilities predicted for 2025, based on data collected through the National Vulnerability Database. These vulnerabilities were ide...

Immagine del sito
The Future of Work: 4-Day Week with AI and Tech Advances
Di Redazione RHC - 13/12/2025

The prospect of a four-day workweek, with a resulting three-day long weekend, may not be far off. This is according to Christopher A. Pissarides , a British-Cypriot economist and Nobel Prize winner, w...

Immagine del sito
Kali Linux 2025.4: Discover the Power of Wayland and Enhanced Security Tools
Di Redazione RHC - 12/12/2025

The recent 2025.4 release of Kali Linux has been made available to the public, introducing significant improvements to the GNOME, KDE, and Xfce desktop environments . From now on, Wayland will be the ...

Immagine del sito
IRS.GOV: alleged data breach affects the accounts of 18 million citizens
Di Redazione RHC - 12/12/2025

An alleged database containing sensitive information on 18 million U.S. citizens over 65 has appeared for sale on a popular dark web forum. The advertiser, who uses the pseudonym “Frenshyny,” clai...

Immagine del sito
Microsoft 365 Okta Phishing Attack: Experts Warn of New Threat
Di Redazione RHC - 12/12/2025

A recent study by Datadog Security Labs reveals an ongoing operation targeting organizations using Microsoft 365 and Okta for single sign-on (SSO) authentication. This operation uses sophisticated tec...

Cyber Sabotage Alert: Volt Typhoon Prepares for Destructive Activities

The Australian Security Intelligence Organisation (ASIO) has raised the alarm about the readiness of authoritarian states to go beyond cyber espionage...
Redazione RHC - 13/11/2025 - 08:20

Microsoft fixes 63 vulnerabilities, including an actively exploited zero-day

On November's Patch Tuesday, Microsoft fixed 63 vulnerabilities , including a critical zero-day vulnerability that had already been exploited in attac...
Redazione RHC - 13/11/2025 - 07:46

Italy and Adult Sites: The Country Where Entry Is Forbidden… But If You Click Yes, It’s Okay

From November 12, 2025, AGCOM reported that in line with art. 13-bis of the Caivano decree (dl123/2023) , 47 adult websites accessible from Italy woul...
Redazione RHC - 13/11/2025 - 07:32

Top Malware: Flame, the modular “spy” malware targeting the Middle East.

Flame, (also known as Flamer, sKyWIper, Skywiper), is a modular computer malware discovered in 2012 that attacked Middle Eastern target computers runn...
Massimiliano Brolli - 12/11/2025 - 22:27

Slammer, the first worm to use a bug that hasn’t been fixed for six months.

Many years have passed since the SQL Slammer worm spread uncontrollably on January 25, 2003. It was one of the fastest-spreading malware in history , ...
Redazione RHC - 12/11/2025 - 22:24

The Story of the First Keylogger: How Hidden Keyboard Control Came to Be

We all know Bruce Schneier , a renowned cryptography and computer security expert, member of the board of directors of the International Association f...
Redazione RHC - 12/11/2025 - 22:19
1 42 43 44 45 46 278

Cyber Sabotage Alert: Volt Typhoon Prepares for Destructive Activities

- November 12th, 2025

The Australian Security Intelligence Organisation (ASIO) has raised the alarm about the readiness of authoritarian states to go beyond cyber espionage to directly sabotage critical infrastructure. Mike Burgess, head of...

Facebook Linkedin X

Microsoft fixes 63 vulnerabilities, including an actively exploited zero-day

- November 12th, 2025

On November's Patch Tuesday, Microsoft fixed 63 vulnerabilities , including a critical zero-day vulnerability that had already been exploited in attacks. This time, the fixes affected a wide range of...

Facebook Linkedin X

Italy and Adult Sites: The Country Where Entry Is Forbidden… But If You Click Yes, It’s Okay

- November 12th, 2025

From November 12, 2025, AGCOM reported that in line with art. 13-bis of the Caivano decree (dl123/2023) , 47 adult websites accessible from Italy would have to introduce an identity...

Facebook Linkedin X

Top Malware: Flame, the modular “spy” malware targeting the Middle East.

- November 11th, 2025

Flame, (also known as Flamer, sKyWIper, Skywiper), is a modular computer malware discovered in 2012 that attacked Middle Eastern target computers running the Microsoft Windows operating system. The program's primary...

Facebook Linkedin X

Slammer, the first worm to use a bug that hasn’t been fixed for six months.

- November 11th, 2025

Many years have passed since the SQL Slammer worm spread uncontrollably on January 25, 2003. It was one of the fastest-spreading malware in history , and with this article we...

Facebook Linkedin X

The Story of the First Keylogger: How Hidden Keyboard Control Came to Be

- November 11th, 2025

We all know Bruce Schneier , a renowned cryptography and computer security expert, member of the board of directors of the International Association for Cryptological Research and a renowned speaker,...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE