Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
2nd Edition GlitchZone RHC 320x100 2
Enterprise BusinessLog 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
BreachForums Resurrects After Yet Another FBI Shutdown
Di Redazione RHC - 26/10/2025

We’ve often quoted this phrase: “Fighting cybercrime is like pulling weeds: if you don’t completely eradicate them, they’ll grow back, much more vigorous than before,” an...

Immagine del sito
Gemini 3.0 Pro: Google prepares for the generational leap and aims to surpass GPT-5 and Claude 4.5
Di Redazione RHC - 25/10/2025

Over the past few days, some users have received a notification saying that their Gemini Advanced devices have been “upgraded from the previous generation model to the 3.0 Pro, the smartest mode...

Immagine del sito
Critical RCE exploit in Microsoft WSUS actively exploited. CISA warns: imminent risk
Di Redazione RHC - 25/10/2025

A global alert has been issued by the United States Cybersecurity and Infrastructure Security Agency (CISA) regarding the active exploitation of a critical remote code execution (RCE) flaw in Microsof...

Immagine del sito
No flesh, no bones, just code! Channel 4’s first AI presenter arrives.
Di Redazione RHC - 24/10/2025

On Monday 20 October, Channel 4 broadcast a full-length documentary hosted by a creative TV presenter powered entirely by artificial intelligence. ” I’m not real. For the first time on a B...

Immagine del sito
Russia and Cybercrime: A Balance Between Selective Repression and State Interest
Di Ada Spinelli - 24/10/2025

The Russian cybercrime ecosystem has entered a phase of profound transformation, triggered by a combination of factors: unprecedented international pressure from law enforcement agencies, a shift in d...

Two critical bugs in Cisco ASA and FTD: score 9.9 and risk of remote code execution

Cisco has disclosed two critical vulnerabilities affecting its Secure Firewall Adaptive Security Appliance (ASA) and Secure Firewall Threat Defense (F...
Redazione RHC - 25/09/2025 - 19:29

Linux dances the samba… but hits a race condition. A critical flaw threatens the kernel.

Trend Research researcher Nicholas Zubrisky has reported a critical vulnerability in the ksmbd component of the Linux kernel that allows remote attack...
Redazione RHC - 25/09/2025 - 16:24

They slept on networks for 393 days! Chinese state hackers and the BRICKSTORM backdoor

According to Google Threat Intelligence , the China-linked espionage group UNC5221 has carried out a series of successful intrusions into corporate ne...
Redazione RHC - 25/09/2025 - 14:29

Code as we knew it is dead! Artificial Intelligence writes the future.

Since 2013, the IEEE has published an annual interactive ranking of the most popular programming languages . However, traditional methods of measuring...
Redazione RHC - 25/09/2025 - 11:21

Cryptocurrencies, ransomware, and hamburgers: the fatal combo for Scattered Spider

The U.S. Department of Justice and British police have charged Talha Jubair, 19, a resident of East London, who investigators believe is a key member ...
Redazione RHC - 25/09/2025 - 11:02

Blade Runner Already Predicted Deepfake! Cyber Lessons from Film Classics

“ Art is a mirror that reflects the soul of the beholder.” This quote, which captures the essence of our experience with cinema, takes on crucial sign...
Daniela Farina - 25/09/2025 - 09:00
1 45 46 47 48 49 206

Two critical bugs in Cisco ASA and FTD: score 9.9 and risk of remote code execution

- September 25th, 2025

Cisco has disclosed two critical vulnerabilities affecting its Secure Firewall Adaptive Security Appliance (ASA) and Secure Firewall Threat Defense (FTD) firewalls, as well as other networking products. Both flaws allow...

Facebook Linkedin X

Linux dances the samba… but hits a race condition. A critical flaw threatens the kernel.

- September 25th, 2025

Trend Research researcher Nicholas Zubrisky has reported a critical vulnerability in the ksmbd component of the Linux kernel that allows remote attackers to execute arbitrary code with maximum system privileges....

Facebook Linkedin X

They slept on networks for 393 days! Chinese state hackers and the BRICKSTORM backdoor

- September 25th, 2025

According to Google Threat Intelligence , the China-linked espionage group UNC5221 has carried out a series of successful intrusions into corporate networks since March of this year, exploiting previously unknown...

Facebook Linkedin X

Code as we knew it is dead! Artificial Intelligence writes the future.

- September 25th, 2025

Since 2013, the IEEE has published an annual interactive ranking of the most popular programming languages . However, traditional methods of measuring popularity may be losing their meaning today, due...

Facebook Linkedin X

Cryptocurrencies, ransomware, and hamburgers: the fatal combo for Scattered Spider

- September 25th, 2025

The U.S. Department of Justice and British police have charged Talha Jubair, 19, a resident of East London, who investigators believe is a key member of Scattered Spider , a...

Facebook Linkedin X

Blade Runner Already Predicted Deepfake! Cyber Lessons from Film Classics

- September 25th, 2025

“ Art is a mirror that reflects the soul of the beholder.” This quote, which captures the essence of our experience with cinema, takes on crucial significance when discussing cybersecurity....

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE