Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
UtiliaCS 320x100
970x20 Itcentric

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Risk averted for millions of Microsoft users! The critical vulnerability in Microsoft SharePoint 9.8
Di Redazione RHC - 21/11/2025

Microsoft has disclosed a critical vulnerability in SharePoint Online (discovered by RHC through our ongoing monitoring of critical CVEs on our portal), identified as CVE‑2025‑59245 , with a CVSS ...

Immagine del sito
MONOLOCK: The new “silent” ransomware group that rejects leak sites and affiliate panels.
Di Luca Stivali - 21/11/2025

The ransomware landscape is changing. The most exposed actors—LockBit, Hunters International, and Trigona—have paid the price for overexposure, including international operations, infiltrations, d...

Immagine del sito
Critical vulnerability in the WordPress plugin W3 Total Cache. 430,000 sites at risk!
Di Redazione RHC - 21/11/2025

A critical vulnerability, CVE-2025-9501, has been discovered in the popular WordPress plugin W3 Total Cache . This vulnerability allows the execution of arbitrary PHP commands on the server without au...

Immagine del sito
Happy birthday, Windows! 40 years of operating system history and still going strong.
Di Redazione RHC - 20/11/2025

Exactly 40 years ago, on November 20, 1985, Microsoft released Windows 1.0 , the first version of Windows, which attempted to transform the then-personal computer from a machine with a monotonous comm...

Immagine del sito
Multi-threaded Hacking: US Pioneers Automated Operations with AI Agents
Di Redazione RHC - 19/11/2025

In recent months, a new cyber operations infrastructure has been developing in the United States, in which automated agents are becoming not just a support tool, but a full-fledged participant in offe...

Are Black Hackers Demanding Ransom? Checkout.com Responds: We Fund Those Hunting You

Payment service Checkout.com was the victim of an extortion attempt: the ShinyHunters group claimed to have accessed company data and demanded a ranso...
Redazione RHC - 16/11/2025 - 12:15

Trump, Hong Kong, and the Global Rush to Regulate Cryptocurrencies

Throughout 2024, there were several signs of a shift in the relationship between institutions and cryptocurrencies. On March 6, President Donald Trump...
Redazione RHC - 16/11/2025 - 12:14

Sam Altman and her husband Oliver and the dream of genetically modified children

The pursuit of immortality is a pervasive obsession in Silicon Valley. Likewise, the idea of perfecting children through genetic modification is anoth...
Redazione RHC - 16/11/2025 - 11:58

The stress of social network algorithms causes burnout in creators

A new research project has shown that the online content industry, which has offered people thousands of new ways to earn money, is also placing signi...
Redazione RHC - 16/11/2025 - 08:53

Discovering Tor Browser: The Digital Fortress for Online Privacy

Tor Browser (short for The Onion Router) is a free, open-source web browser designed specifically to protect users' online privacy. Using a network of...
Raffaela Crisci - 15/11/2025 - 16:12

Virtual Private Network (VPN): What It Is, How It Works, and Why

A VPN , short for Virtual Private Network, is a system that allows you to establish a secure and private connection over a public network, such as the...
Redazione RHC - 15/11/2025 - 16:10
1 6 7 8 9 10 249

Are Black Hackers Demanding Ransom? Checkout.com Responds: We Fund Those Hunting You

- November 16th, 2025

Payment service Checkout.com was the victim of an extortion attempt: the ShinyHunters group claimed to have accessed company data and demanded a ransom. An investigation revealed that the attackers had...

Facebook Linkedin X

Trump, Hong Kong, and the Global Rush to Regulate Cryptocurrencies

- November 16th, 2025

Throughout 2024, there were several signs of a shift in the relationship between institutions and cryptocurrencies. On March 6, President Donald Trump signed an executive order establishing a "Bitcoin Strategic...

Facebook Linkedin X

Sam Altman and her husband Oliver and the dream of genetically modified children

- November 16th, 2025

The pursuit of immortality is a pervasive obsession in Silicon Valley. Likewise, the idea of perfecting children through genetic modification is another. Sam Altman, the man who brought artificial intelligence...

Facebook Linkedin X

The stress of social network algorithms causes burnout in creators

- November 16th, 2025

A new research project has shown that the online content industry, which has offered people thousands of new ways to earn money, is also placing significant mental stress on its...

Facebook Linkedin X

Discovering Tor Browser: The Digital Fortress for Online Privacy

- November 15th, 2025

Tor Browser (short for The Onion Router) is a free, open-source web browser designed specifically to protect users' online privacy. Using a network of servers distributed around the world, Tor...

Facebook Linkedin X

Virtual Private Network (VPN): What It Is, How It Works, and Why

- November 15th, 2025

A VPN , short for Virtual Private Network, is a system that allows you to establish a secure and private connection over a public network, such as the Internet ....

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE