Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

The Great Firewall in the Spotlight: The Leak Revealing the Industrialization of Chinese Censorship
Di Redazione RHC - 16/09/2025

Edited by Luca Stivali and Olivia Terragni. On September 11, 2025, what can be defined as the largest leak ever suffered by the Great Firewall of China (GFW) exploded in the media, massively and massi...

OpenAI and Microsoft reach agreement to transform into a public utility company.
Di Redazione RHC - 13/09/2025

OpenAI has entered into a memorandum of understanding with Microsoft to review its partnership, which could lead to the company’s transformation into a Public Benefit Corporation (PBC). If the trans...

Goodbye PowerShell 2.0 and WMIC! The great Windows 11 cleanup has begun.
Di Redazione RHC - 12/09/2025

Windows 11 users who have installed the September 2025 Update might think that practically nothing changes. At first glance, KB5065426 looks like a normal small patch that Microsoft distributes to eve...

Looking for Volodymyr Tymoshchuk! 11 million dollars for the Nefilim hacker
Di Redazione RHC - 12/09/2025

The U.S. Department of Justice has indicted Ukrainian Volodymyr Tymoshchuk on seven counts of computer hacking and extortion. He is considered one of the most dangerous hackers of recent years. The in...

In Nepal, people are dying for social media! 19 people lost their lives trying to get Facebook back
Di Redazione RHC - 09/09/2025

In a dramatic reversal, Nepal has lifted the nationwide social media blackout imposed last week after it sparked massive youth protests and caused at least 19 deaths, according to local media. The dec...

Looking for Volodymyr Tymoshchuk! 11 million dollars for the Nefilim hacker

The U.S. Department of Justice has indicted Ukrainian Volodymyr Tymoshchuk on seven counts of computer hacking and extortion. He is considered one of ...
Redazione RHC - 12/09/2025 - 08:29

Microsoft warns: Critical vulnerabilities in Office! Users and admins at risk

On September 9, 2025, two significant vulnerabilities were discovered in Microsoft Office, for which dedicated patches were created. These vulnerabili...
Redazione RHC - 12/09/2025 - 08:16

New AD DS Vulnerability (CVE-2025-21293) Could Hand Hackers the Keys to the Entire Corporate Network

Microsoft recently published a security advisory regarding a new vulnerability affecting Active Directory Domain Services (AD DS). The flaw, identifie...
Antonio Piazzolla - 12/09/2025 - 08:07

Google fights misinformation: C2PA arrives on Pixel and Photos for AI image recognition.

Google announced that it will integrate C2PA Content Credentials technology into the Pixel 10 camera app and Google Photos to help users distinguish a...
Redazione RHC - 12/09/2025 - 07:59

FlexiSPY Alert: The Easy-to-Use Spy App Can Intercept Everything, Even El Chapo

Two Kenyan documentary filmmakers were placed under surveillance by security services for their work on a film about youth protests. Computer forensic...
Redazione RHC - 12/09/2025 - 07:51

SpamGPT is here! The new phishing kit that combines AI, spam, and diabolical genius.

A new tool called SpamGPT has appeared on underground forums and has quickly become a hot topic in the cybersecurity community. The malicious software...
Redazione RHC - 11/09/2025 - 19:10
1 6 7 8 9 10 145

Looking for Volodymyr Tymoshchuk! 11 million dollars for the Nefilim hacker

- September 12th, 2025

The U.S. Department of Justice has indicted Ukrainian Volodymyr Tymoshchuk on seven counts of computer hacking and extortion. He is considered one of the most dangerous hackers of recent years....

  

Microsoft warns: Critical vulnerabilities in Office! Users and admins at risk

- September 12th, 2025

On September 9, 2025, two significant vulnerabilities were discovered in Microsoft Office, for which dedicated patches were created. These vulnerabilities, if exploited by attackers, could allow malicious code to be...

  

New AD DS Vulnerability (CVE-2025-21293) Could Hand Hackers the Keys to the Entire Corporate Network

- September 12th, 2025

Microsoft recently published a security advisory regarding a new vulnerability affecting Active Directory Domain Services (AD DS). The flaw, identified as CVE-2025-21293, is classified as an Elevation of Privilege vulnerability...

  

Google fights misinformation: C2PA arrives on Pixel and Photos for AI image recognition.

- September 12th, 2025

Google announced that it will integrate C2PA Content Credentials technology into the Pixel 10 camera app and Google Photos to help users distinguish authentic images from those created or modified...

  

FlexiSPY Alert: The Easy-to-Use Spy App Can Intercept Everything, Even El Chapo

- September 12th, 2025

Two Kenyan documentary filmmakers were placed under surveillance by security services for their work on a film about youth protests. Computer forensics researchers say their phones were infected with FlexiSPY...

  

SpamGPT is here! The new phishing kit that combines AI, spam, and diabolical genius.

- September 11th, 2025

A new tool called SpamGPT has appeared on underground forums and has quickly become a hot topic in the cybersecurity community. The malicious software combines the capabilities of generative artificial...

  

Sign up for the newsletter