Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
320×100
Crowdstriker 970×120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Microsoft Blocks KMS38 Activation Method for Windows 10 and 11
Di Redazione RHC - 23/11/2025

Users noticed that last week Microsoft developers disabled the offline activation method for Windows 11 and 10 via KMS38, which has been used by hackers around the world for years. However, the offici...

Immagine del sito
ATMs targeted! Cybersecurity experts reveal an attack campaign targeting ATMs.
Di Redazione RHC - 23/11/2025

Group-IB experts presented a detailed analysis of the long-running UNC2891 campaign, which demonstrated the continuing sophistication of ATM attack schemes. Attention focused on the Raspberry Pi, whic...

Immagine del sito
“We Want to Hack You Again!” NSO Group Rejects WhatsApp’s Pegasus Lawsuit
Di Redazione RHC - 22/11/2025

Israeli company NSO Group has appealed a California federal court ruling that bars it from using WhatsApp’s infrastructure to distribute its Pegasus surveillance software. The case, which has been o...

Immagine del sito
Oracle under attack: Pre-auth RCE vulnerability discovered that compromises entire systems
Di Redazione RHC - 22/11/2025

A vulnerability, designated CVE-2025-61757, was made public by Searchlight Cyber last Thursday. Company researchers discovered the issue and notified Oracle, which led to its disclosure. Oracle fixed ...

Immagine del sito
Risk averted for millions of Microsoft users! The critical vulnerability in Microsoft SharePoint 9.8
Di Redazione RHC - 21/11/2025

Microsoft has disclosed a critical vulnerability in SharePoint Online (discovered by RHC through our ongoing monitoring of critical CVEs on our portal), identified as CVE‑2025‑59245 , with a CVSS ...

What is Cross-Site Scripting? An article to help you understand it in a simple way.

Author : Davide Cavallini Today I will try to use the same dialectic ( as previously done in the article on SQL injection ), and explain in a simple w...
Davide Cavallini - 17/11/2025 - 21:58

Spy Apps: How Spyware Works and Why It’s a Privacy Risk

Spyware (also known as spy apps) represent one of the most insidious and dangerous threats of the digital age. These are malicious programs designed t...
Redazione RHC - 17/11/2025 - 21:52

Asus releases emergency firmware update for vulnerable DSL routers.

Asus has released an emergency firmware update for several DSL router models. The patch addresses a critical vulnerability that allows attackers to ta...
Redazione RHC - 17/11/2025 - 18:22

Nuclear power entirely in the hands of AI! And what if there’s an accident?

In the technological field, the idea that the future development of generating systems depends inexorably on the expansion of nuclear capacity is taki...
Redazione RHC - 17/11/2025 - 16:50

Veeam Analysis: Ransomware Payments Decline, But Data Resilience Remains Critical for EMEA Enterprises

Beyond backup: Businesses need cyber resilience, data portability, secure cloud storage, and hybrid cloud protection . Data from the Veeam Ransomware ...
Redazione RHC - 17/11/2025 - 08:02

The History of GPS: The History of Satellite Navigation

It's amazing how far we've come with satellite navigation in the last 40 years. GPS (Global Positioning System) is one of the most useful things to ha...
Redazione RHC - 17/11/2025 - 07:46
1 6 7 8 9 10 251

What is Cross-Site Scripting? An article to help you understand it in a simple way.

- November 17th, 2025

Author : Davide Cavallini Today I will try to use the same dialectic ( as previously done in the article on SQL injection ), and explain in a simple way...

Facebook Linkedin X

Spy Apps: How Spyware Works and Why It’s a Privacy Risk

- November 17th, 2025

Spyware (also known as spy apps) represent one of the most insidious and dangerous threats of the digital age. These are malicious programs designed to infiltrate a user's device, collecting...

Facebook Linkedin X

Asus releases emergency firmware update for vulnerable DSL routers.

- November 17th, 2025

Asus has released an emergency firmware update for several DSL router models. The patch addresses a critical vulnerability that allows attackers to take complete control of devices without authentication. The...

Facebook Linkedin X

Nuclear power entirely in the hands of AI! And what if there’s an accident?

- November 17th, 2025

In the technological field, the idea that the future development of generating systems depends inexorably on the expansion of nuclear capacity is taking root, pushing the sector's players to identify...

Facebook Linkedin X

Veeam Analysis: Ransomware Payments Decline, But Data Resilience Remains Critical for EMEA Enterprises

- November 17th, 2025

Beyond backup: Businesses need cyber resilience, data portability, secure cloud storage, and hybrid cloud protection . Data from the Veeam Ransomware Trends Reports 2024 and 2025 shows that the number...

Facebook Linkedin X

The History of GPS: The History of Satellite Navigation

- November 17th, 2025

It's amazing how far we've come with satellite navigation in the last 40 years. GPS (Global Positioning System) is one of the most useful things to have ever come out...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE