Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Israeli company NSO Group has appealed a California federal court ruling that bars it from using WhatsApp’s infrastructure to distribute its Pegasus surveillance software. The case, which has been o...

A vulnerability, designated CVE-2025-61757, was made public by Searchlight Cyber last Thursday. Company researchers discovered the issue and notified Oracle, which led to its disclosure. Oracle fixed ...

Microsoft has disclosed a critical vulnerability in SharePoint Online (discovered by RHC through our ongoing monitoring of critical CVEs on our portal), identified as CVE‑2025‑59245 , with a CVSS ...

The ransomware landscape is changing. The most exposed actors—LockBit, Hunters International, and Trigona—have paid the price for overexposure, including international operations, infiltrations, d...

A critical vulnerability, CVE-2025-9501, has been discovered in the popular WordPress plugin W3 Total Cache . This vulnerability allows the execution of arbitrary PHP commands on the server without au...
“YOU ARE WORTH IT, YOU’RE NEVER TOO YOUNG TO CHANGE THE WORLD”: Nicola Bellotti’s vision
Gemini 3.0 Pro: What people who are trying it say
From Body to Screen: How Sexual Abuse Has Moved to the Digital World
Apache Tomcat Vulnerability: Update Now to Avoid Security Risks
Paycheck piracy is coming! And the paycheck transfer goes to criminals.
CrowdStrike: 76% of organizations struggle to combat AI attacks

“YOU ARE WORTH IT, YOU’RE NEVER TOO YOUNG TO CHANGE THE WORLD”: Nicola Bellotti’s vision
Olivia Terragni - October 28th, 2025
We often try to explain the hybrid, simultaneous, and contradictory world in which young people live in perpetual connection, but the truth is that as adults, we struggle to understand...

Gemini 3.0 Pro: What people who are trying it say
Redazione RHC - October 28th, 2025
In recent days, a select few users have reported having access to the new Gemini 3.0 Pro model. Initial impressions suggest a significant improvement over the previous generation, so much...

From Body to Screen: How Sexual Abuse Has Moved to the Digital World
Paolo Galdieri - October 28th, 2025
This is the second in a series of articles analyzing gender-based violence in the digital context, in anticipation of November 25th, the International Day for the Elimination of Violence against...

Apache Tomcat Vulnerability: Update Now to Avoid Security Risks
Redazione RHC - October 28th, 2025
Many web applications rely on Apache Tomcat, a widely used open-source Java servlet container. On October 27, 2025, Apache disclosed two vulnerabilities: CVE-2025-55752 and CVE-2025-55754, affecting several versions of Tomcat....

Paycheck piracy is coming! And the paycheck transfer goes to criminals.
Redazione RHC - October 28th, 2025
According to a new report from Microsoft Threat Intelligence , the financially motivated Storm-2657 group is conducting large-scale attacks against universities and businesses , using stolen employee accounts to redirect...

CrowdStrike: 76% of organizations struggle to combat AI attacks
Redazione RHC - October 28th, 2025
Enterprises are lagging behind in ransomware preparedness as adversaries use AI across the attack chain to accelerate intrusion, encryption and extortion. Milan – October 27, 2025 – According to CrowdStrike...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

