Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Mobile
Fortinet 970x120px

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

The History of GPS: The History of Satellite Navigation

It's amazing how far we've come with satellite navigation in the last 40 years. GPS (Global Positioning System) is one...
Redazione RHC - 17 November 2025

Tor Browser 15.0.1: Critical Vulnerability Fixes and Improvements

The Tor Project has released Tor Browser 15.0.1 , fixing critical security vulnerabilities inherited from Firefox 140.5.0esr. This maintenance release...
Redazione RHC - 17 November 2025

16 Years of Go: An Innovative and Scalable Programming Language

In November 2025, the Go programming language turned 16 years old. It was released publicly on November 10, 2009 ,...
Redazione RHC - 17 November 2025

Google is ready to launch Gemini 3.0: will it really be the turning point in the AI race?

Google is getting closer to the official unveiling of Gemini 3.0 , the new artificial intelligence model destined to represent...
Redazione RHC - 16 November 2025

The Louvre was deceived by two Belgian pranksters! They hung their painting next to the Mona Lisa.

Louvre security is under fire again after pranksters managed to trick guards and hang their painting in the same room...
Redazione RHC - 16 November 2025

Are Black Hackers Demanding Ransom? Checkout.com Responds: We Fund Those Hunting You

Payment service Checkout.com was the victim of an extortion attempt: the ShinyHunters group claimed to have accessed company data and...
Redazione RHC - 16 November 2025

Port scanning in 2025: Nmap and AI — how to integrate them securely and operationally

In 2025, port scanning remains a key activity for both Red Teams (reconnaissance, discovery, fingerprinting) and Blue Teams (monitoring and proactive defense). But the latest development is the arrival of...
Share on Facebook Share on LinkedIn Share on X

The Louvre Theft: When Thieves Taught the World the Physical Pen Test

The event that shook the world on October 19, 2025, was not a natural disaster or a financial collapse, but the sensational theft of Napoleon's jewels from the Louvre Museum....
Share on Facebook Share on LinkedIn Share on X

Starting November 12th, age verification for porn sites will be implemented in Italy. What’s changing?

Starting Tuesday, November 12, 2025, new provisions from the Italian Communications Regulatory Authority (AGCOM) will come into force, requiring an age verification system for accessing pornographic websites. The measure, provided...
Share on Facebook Share on LinkedIn Share on X

AzureHound: The “Legitimate” Tool for Cloud Attacks

AzureHound, part of the BloodHound suite, was born as an open-source tool to help security teams and red teams identify vulnerabilities and escalation paths in Microsoft Azure and Entra ID...
Share on Facebook Share on LinkedIn Share on X

Red Hot Cyber launches free real-time CVE Enrichment service

Timeliness is key in cybersecurity. Red Hot Cyber recently launched a completely free service that allows IT professionals, security analysts, and enthusiasts to monitor the most critical vulnerabilities published in...
Share on Facebook Share on LinkedIn Share on X

Going 50 Years Without Charging Your Phone: Here’s the Chinese Battery That Will Change Everything

Beijing-based Betavolt claims to have developed a nuclear battery that represents the world's first achievement in the miniaturization of atomic energy. This innovation involves integrating 63 nuclear isotopes into a...
Share on Facebook Share on LinkedIn Share on X

Mossad, the rigged supply chain, and intimidated judges

Yossi Cohen, former director of the Mossad, has said publicly two things that usually remain locked away in a room without tape recorders. First, Israel allegedly deployed a global sabotage...
Share on Facebook Share on LinkedIn Share on X

Nvidia invests $1 billion in Nokia to develop 6G networks with AI

Jen-Hsun Huang dropped a bombshell: Nvidia has reportedly invested $1 billion in Nokia. Yes, Nokia is the company that made Symbian phones so popular 20 years ago. In his speech,...
Share on Facebook Share on LinkedIn Share on X

Windows 11 Task Manager Bug: How to Fix It

Microsoft's Windows 11 updates often contain unexplained bugs, especially patches for new features, such as the recently released KB5067036 . While KB5067036 is an optional update, it introduced a completely...
Share on Facebook Share on LinkedIn Share on X

Linux and gaming: an increasingly reliable combination

According to Boiling Steam , the number of Windows games running reliably on Linux is the highest ever recorded. The analysis is based on statistics from ProtonDB , which collects...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sito
Critical MongoDB Vulnerability Exposed: CVE-2025-14847
Redazione RHC - 23/12/2025

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…

Immagine del sito
RansomHouse Ransomware Upgraded: Enhanced Encryption Threat
Redazione RHC - 22/12/2025

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…

Immagine del sito
Cyber Attacks on the Rise: Wiper Malware and Data Destruction in 2025
Redazione RHC - 22/12/2025

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers use wipers, destructive tools that…

Immagine del sito
MS13-089 Ransomware: Double Extortion Without Encryption
Inva Malaj - 22/12/2025

MS13-089 opens a leak site on the dark web, exposes the first data and adopts a double extortion strategy without encryption. A brand built on an old Microsoft ID For years, “MS13-089” identified a 2013…

Immagine del sito
Microsoft Shifts Activation Process: What It Means for Air-Gapped Systems
Redazione RHC - 22/12/2025

In the past, many users and system administrators have relied on Microsoft’s telephone activation service to manage installations in specific contexts. During the Windows 8 era, MAK ( Multiple Activation Key) licenses were widely available.…