Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Fortinet 320x100px
Banner Ransomfeed 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
No flesh, no bones, just code! Channel 4’s first AI presenter arrives.
Di Redazione RHC - 24/10/2025

On Monday 20 October, Channel 4 broadcast a full-length documentary hosted by a creative TV presenter powered entirely by artificial intelligence. ” I’m not real. For the first time on a B...

Immagine del sito
Russia and Cybercrime: A Balance Between Selective Repression and State Interest
Di Ada Spinelli - 24/10/2025

The Russian cybercrime ecosystem has entered a phase of profound transformation, triggered by a combination of factors: unprecedented international pressure from law enforcement agencies, a shift in d...

Immagine del sito
Hackers can access Microsoft Teams chats and emails using access tokens
Di Redazione RHC - 24/10/2025

A recent discovery has revealed that hackers can exploit a flaw in Microsoft Teams on Windows to obtain encrypted authentication tokens , which grant unauthorized access to chats, emails, and files st...

Immagine del sito
FIA website hacked: personal data of Max Verstappen and over 7,000 drivers exposed
Di Redazione RHC - 24/10/2025

Security researchers have discovered vulnerabilities in an FIA website that contained sensitive personal information and documents relating to drivers, including world champion Max Verstappen. Ian Car...

Immagine del sito
Artificial General Intelligence (AGI): the first global standard for measuring it has been defined
Di Redazione RHC - 23/10/2025

On October 21, 2025, an international team of researchers from 29 leading institutions—including Stanford University, MIT, and the University of California, Berkeley —completed a study that marks ...

Kali Linux 2025.3 is out! A new release with improvements and new tools.

Kali Linux developers have released a new release, 2025.3 , which expands the distribution's functionality and adds ten new penetration testing tools....
Redazione RHC - 24/09/2025 - 21:14

CrowdStrike: Cybersecurity Enters the Age of AI Agents

At Fal.Con 2025, the annual conference that brings together thousands of cybersecurity experts from around the world, CrowdStrike made one thing clear...
Marcello Filacchioni - 24/09/2025 - 18:05

Critical bug in Salesforce CLI: Arbitrary code execution and SYSTEM access

A critical vulnerability in the Salesforce CLI installer (sf-x64.exe) allows attackers to gain arbitrary code execution, privilege escalation, and SYS...
Redazione RHC - 24/09/2025 - 17:17

Google Chrome Zero-Day Vulnerability: CISA Warns and Files Bug on KEV

The United States has received an alert from the Cybersecurity and Infrastructure Security Agency (CISA) regarding a highly critical zero-day flaw in ...
Redazione RHC - 24/09/2025 - 16:01

Violent social media and video games: the new ticking time bomb for teens.

The uncontrolled use of social media and violent video games poses a growing threat to adolescents at a crucial stage of their development. Child and ...
Redazione RHC - 24/09/2025 - 12:53

WhatsApp introduces in-app message translation

WhatsApp has announced a new feature that allows for in-app message translation . The company emphasizes that language barriers often limit free commu...
Redazione RHC - 24/09/2025 - 12:42
1 44 45 46 47 48 204

Kali Linux 2025.3 is out! A new release with improvements and new tools.

- September 24th, 2025

Kali Linux developers have released a new release, 2025.3 , which expands the distribution's functionality and adds ten new penetration testing tools. The update improves deployment processes in virtual environments,...

Facebook Linkedin X

CrowdStrike: Cybersecurity Enters the Age of AI Agents

- September 24th, 2025

At Fal.Con 2025, the annual conference that brings together thousands of cybersecurity experts from around the world, CrowdStrike made one thing clear: cyber defense is entering a new era, that...

Facebook Linkedin X

Critical bug in Salesforce CLI: Arbitrary code execution and SYSTEM access

- September 24th, 2025

A critical vulnerability in the Salesforce CLI installer (sf-x64.exe) allows attackers to gain arbitrary code execution, privilege escalation, and SYSTEM-level access on Windows systems. The vulnerability exploits the way the...

Facebook Linkedin X

Google Chrome Zero-Day Vulnerability: CISA Warns and Files Bug on KEV

- September 24th, 2025

The United States has received an alert from the Cybersecurity and Infrastructure Security Agency (CISA) regarding a highly critical zero-day flaw in Google Chrome, which is currently being exploited in...

Facebook Linkedin X

Violent social media and video games: the new ticking time bomb for teens.

- September 24th, 2025

The uncontrolled use of social media and violent video games poses a growing threat to adolescents at a crucial stage of their development. Child and adolescent health experts warn that...

Facebook Linkedin X

WhatsApp introduces in-app message translation

- September 24th, 2025

WhatsApp has announced a new feature that allows for in-app message translation . The company emphasizes that language barriers often limit free communication, considering its service is used daily by...

Facebook Linkedin X
Most Read Articles of the Month Most Read Articles of the Week
  1. The Truth About Windows XP License Key: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8
  2. Google launches Gemini 3.0 Pro: new multimodal language model
  3. Computer science graduates with no future! Thousands of resumes ignored, and goodbye to six-figure salaries.
  4. Google Announces Gemini 3.0: Artificial Intelligence Evolves Toward AGI
  5. With 50 dollars and physical access to the server, the Cloud goes to hell
  1. Google launches Gemini 3.0 Pro: new multimodal language model
  2. Google Announces Gemini 3.0: Artificial Intelligence Evolves Toward AGI
  3. Critical vulnerability in Windows SMB client: CISA raises alarm
  4. NIS2 and new ACN guidelines: what changes for companies and how to prepare
  5. ChatGPT writes the perfect scam… but the scammer leaves the AI instructions inside.

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE