Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The ransomware landscape is changing. The most exposed actors—LockBit, Hunters International, and Trigona—have paid the price for overexposure, including international operations, infiltrations, d...

A critical vulnerability, CVE-2025-9501, has been discovered in the popular WordPress plugin W3 Total Cache . This vulnerability allows the execution of arbitrary PHP commands on the server without au...

Exactly 40 years ago, on November 20, 1985, Microsoft released Windows 1.0 , the first version of Windows, which attempted to transform the then-personal computer from a machine with a monotonous comm...

In recent months, a new cyber operations infrastructure has been developing in the United States, in which automated agents are becoming not just a support tool, but a full-fledged participant in offe...

The scale of the leak, described by a team from the University of Vienna , demonstrates how dangerous the familiar contact search function of popular messaging apps can be. WhatsApp has always emphasi...
OpenAI is working on a neural network for music creation
Oracle VirtualBox Vulnerability: Risk of Virtual Machine Escape
YouTube Ghost Network: The phantom network that infected millions of users
While Pope Francis is alive and continues his ministry, disinformation is rampant.
New submarine cables in the Black Sea: Europe seeks digital independence from Russia
BreachForums Resurrects After Yet Another FBI Shutdown

OpenAI is working on a neural network for music creation
Redazione RHC - October 26th, 2025
According to The Information, OpenAI is actively working on its own neural network for music creation , which will compete with projects like Suno and Udio. The publication's sources report...

Oracle VirtualBox Vulnerability: Risk of Virtual Machine Escape
Redazione RHC - October 26th, 2025
BI.ZONE specialists have identified two vulnerabilities (CVE-2025-62592 and CVE-2025-61760) in Oracle VirtualBox. When combined, they allowed an attacker to exit a virtual machine and reach the ARM-based macOS host system....

YouTube Ghost Network: The phantom network that infected millions of users
Redazione RHC - October 26th, 2025
Google specialists removed over 3,000 videos from YouTube that spread hidden information disguised as hacked software and video game cheats. Check Point researchers dubbed this campaign " YouTube Ghost Network"...

While Pope Francis is alive and continues his ministry, disinformation is rampant.
Redazione RHC - October 26th, 2025
A survey conducted by the European Broadcasting Union (EBU), with support from the BBC, has highlighted that the most popular chatbots tend to distort news , changing its meaning, confusing...

New submarine cables in the Black Sea: Europe seeks digital independence from Russia
Redazione RHC - October 26th, 2025
Eastern Europe is preparing for a new phase in telecommunications security. An ambitious submarine cable project, called Kardesa , will connect Bulgaria, Georgia, Turkey, and Ukraine without crossing Russian territorial...

BreachForums Resurrects After Yet Another FBI Shutdown
Redazione RHC - October 26th, 2025
We've often quoted this phrase: "Fighting cybercrime is like pulling weeds: if you don't completely eradicate them, they'll grow back, much more vigorous than before," and it's more relevant than...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

