Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Crowdstrike 320×100
UtiliaCS 970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
MONOLOCK: The new “silent” ransomware group that rejects leak sites and affiliate panels.
Di Luca Stivali - 21/11/2025

The ransomware landscape is changing. The most exposed actors—LockBit, Hunters International, and Trigona—have paid the price for overexposure, including international operations, infiltrations, d...

Immagine del sito
Critical vulnerability in the WordPress plugin W3 Total Cache. 430,000 sites at risk!
Di Redazione RHC - 21/11/2025

A critical vulnerability, CVE-2025-9501, has been discovered in the popular WordPress plugin W3 Total Cache . This vulnerability allows the execution of arbitrary PHP commands on the server without au...

Immagine del sito
Happy birthday, Windows! 40 years of operating system history and still going strong.
Di Redazione RHC - 20/11/2025

Exactly 40 years ago, on November 20, 1985, Microsoft released Windows 1.0 , the first version of Windows, which attempted to transform the then-personal computer from a machine with a monotonous comm...

Immagine del sito
Multi-threaded Hacking: US Pioneers Automated Operations with AI Agents
Di Redazione RHC - 19/11/2025

In recent months, a new cyber operations infrastructure has been developing in the United States, in which automated agents are becoming not just a support tool, but a full-fledged participant in offe...

Immagine del sito
WhatsApp data leak: 3.5 billion numbers “stolen” by researchers at the University of Vienna
Di Redazione RHC - 19/11/2025

The scale of the leak, described by a team from the University of Vienna , demonstrates how dangerous the familiar contact search function of popular messaging apps can be. WhatsApp has always emphasi...

OpenAI is working on a neural network for music creation

According to The Information, OpenAI is actively working on its own neural network for music creation , which will compete with projects like Suno and...
Redazione RHC - 26/10/2025 - 17:41

Oracle VirtualBox Vulnerability: Risk of Virtual Machine Escape

BI.ZONE specialists have identified two vulnerabilities (CVE-2025-62592 and CVE-2025-61760) in Oracle VirtualBox. When combined, they allowed an attac...
Redazione RHC - 26/10/2025 - 16:33

YouTube Ghost Network: The phantom network that infected millions of users

Google specialists removed over 3,000 videos from YouTube that spread hidden information disguised as hacked software and video game cheats. Check Poi...
Redazione RHC - 26/10/2025 - 16:25

While Pope Francis is alive and continues his ministry, disinformation is rampant.

A survey conducted by the European Broadcasting Union (EBU), with support from the BBC, has highlighted that the most popular chatbots tend to distort...
Redazione RHC - 26/10/2025 - 09:45

New submarine cables in the Black Sea: Europe seeks digital independence from Russia

Eastern Europe is preparing for a new phase in telecommunications security. An ambitious submarine cable project, called Kardesa , will connect Bulgar...
Redazione RHC - 26/10/2025 - 09:21

BreachForums Resurrects After Yet Another FBI Shutdown

We've often quoted this phrase: "Fighting cybercrime is like pulling weeds: if you don't completely eradicate them, they'll grow back, much more vigor...
Redazione RHC - 26/10/2025 - 08:58
1 43 44 45 46 47 249

OpenAI is working on a neural network for music creation

- October 26th, 2025

According to The Information, OpenAI is actively working on its own neural network for music creation , which will compete with projects like Suno and Udio. The publication's sources report...

Facebook Linkedin X

Oracle VirtualBox Vulnerability: Risk of Virtual Machine Escape

- October 26th, 2025

BI.ZONE specialists have identified two vulnerabilities (CVE-2025-62592 and CVE-2025-61760) in Oracle VirtualBox. When combined, they allowed an attacker to exit a virtual machine and reach the ARM-based macOS host system....

Facebook Linkedin X

YouTube Ghost Network: The phantom network that infected millions of users

- October 26th, 2025

Google specialists removed over 3,000 videos from YouTube that spread hidden information disguised as hacked software and video game cheats. Check Point researchers dubbed this campaign " YouTube Ghost Network"...

Facebook Linkedin X

While Pope Francis is alive and continues his ministry, disinformation is rampant.

- October 26th, 2025

A survey conducted by the European Broadcasting Union (EBU), with support from the BBC, has highlighted that the most popular chatbots tend to distort news , changing its meaning, confusing...

Facebook Linkedin X

New submarine cables in the Black Sea: Europe seeks digital independence from Russia

- October 26th, 2025

Eastern Europe is preparing for a new phase in telecommunications security. An ambitious submarine cable project, called Kardesa , will connect Bulgaria, Georgia, Turkey, and Ukraine without crossing Russian territorial...

Facebook Linkedin X

BreachForums Resurrects After Yet Another FBI Shutdown

- October 26th, 2025

We've often quoted this phrase: "Fighting cybercrime is like pulling weeds: if you don't completely eradicate them, they'll grow back, much more vigorous than before," and it's more relevant than...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE