Red Hot Cyber. The Cybersecurity Blog
Featured Articles

MITRE has released its ranking of the 25 most dangerous software vulnerabilities predicted for 2025, based on data collected through the National Vulnerability Database. These vulnerabilities were ide...

The prospect of a four-day workweek, with a resulting three-day long weekend, may not be far off. This is according to Christopher A. Pissarides , a British-Cypriot economist and Nobel Prize winner, w...

The recent 2025.4 release of Kali Linux has been made available to the public, introducing significant improvements to the GNOME, KDE, and Xfce desktop environments . From now on, Wayland will be the ...

An alleged database containing sensitive information on 18 million U.S. citizens over 65 has appeared for sale on a popular dark web forum. The advertiser, who uses the pseudonym “Frenshyny,” clai...

A recent study by Datadog Security Labs reveals an ongoing operation targeting organizations using Microsoft 365 and Okta for single sign-on (SSO) authentication. This operation uses sophisticated tec...
Cyber Sabotage Alert: Volt Typhoon Prepares for Destructive Activities
Microsoft fixes 63 vulnerabilities, including an actively exploited zero-day
Italy and Adult Sites: The Country Where Entry Is Forbidden… But If You Click Yes, It’s Okay
Top Malware: Flame, the modular “spy” malware targeting the Middle East.
Slammer, the first worm to use a bug that hasn’t been fixed for six months.
The Story of the First Keylogger: How Hidden Keyboard Control Came to Be

Cyber Sabotage Alert: Volt Typhoon Prepares for Destructive Activities
Redazione RHC - November 12th, 2025
The Australian Security Intelligence Organisation (ASIO) has raised the alarm about the readiness of authoritarian states to go beyond cyber espionage to directly sabotage critical infrastructure. Mike Burgess, head of...

Microsoft fixes 63 vulnerabilities, including an actively exploited zero-day
Redazione RHC - November 12th, 2025
On November's Patch Tuesday, Microsoft fixed 63 vulnerabilities , including a critical zero-day vulnerability that had already been exploited in attacks. This time, the fixes affected a wide range of...

Italy and Adult Sites: The Country Where Entry Is Forbidden… But If You Click Yes, It’s Okay
Redazione RHC - November 12th, 2025
From November 12, 2025, AGCOM reported that in line with art. 13-bis of the Caivano decree (dl123/2023) , 47 adult websites accessible from Italy would have to introduce an identity...

Top Malware: Flame, the modular “spy” malware targeting the Middle East.
Massimiliano Brolli - November 11th, 2025
Flame, (also known as Flamer, sKyWIper, Skywiper), is a modular computer malware discovered in 2012 that attacked Middle Eastern target computers running the Microsoft Windows operating system. The program's primary...

Slammer, the first worm to use a bug that hasn’t been fixed for six months.
Redazione RHC - November 11th, 2025
Many years have passed since the SQL Slammer worm spread uncontrollably on January 25, 2003. It was one of the fastest-spreading malware in history , and with this article we...

The Story of the First Keylogger: How Hidden Keyboard Control Came to Be
Redazione RHC - November 11th, 2025
We all know Bruce Schneier , a renowned cryptography and computer security expert, member of the board of directors of the International Association for Cryptological Research and a renowned speaker,...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

