Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Gartner analysts have urged businesses to temporarily stop using browsers with built-in artificial intelligence (AI) capabilities . In a recent advisory, the company emphasizes that such tools pose un...

A critical vulnerability affecting the FortiOS, FortiWeb, FortiProxy , and FortiSwitchManager product lines has been reported by Fortinet via an urgent security advisory. This advisory was issued in c...

It seems the White House isn’t entirely clear … at least judging by yet another change of heart regarding the sale of Nvidia’s advanced chips to China, with the Trump administration having decid...

According to a recently released report by the Financial Crimes Enforcement Network (FinCEN) , global ransomware activity peaked in 2023, only to plummet in 2024. This decline is attributed to success...

Despite significant geopolitical challenges, the mercenary spyware industry remains a resilient and persistent threat; in this context, the well-known vendor Intellexa continues to expand its arsenal....
Google Chrome 143 Patch Fixes Critical V8 JavaScript Vulnerability
Cybersecurity in December: How Compliance Hurries Leave Companies Vulnerable
Managing AI Agents: Mitigating Security Risks in Autonomous Systems
Mistral AI Unveils Powerful Open Source Models for Advanced AI Applications
Maha Grass APT Group Unleashes StreamSpy Malware Attacks
Digital Crime Among Teenagers: Temporary Involvement

Google Chrome 143 Patch Fixes Critical V8 JavaScript Vulnerability
Redazione RHC - December 2nd, 2025
Google has released Chrome 143 for Windows, macOS, and Linux; the release contains an important patch. The new version ( 143.0.7499.40 for Linux and 143.0.7499.40/41 for Windows and macOS) addresses...

Cybersecurity in December: How Compliance Hurries Leave Companies Vulnerable
Ambra Santoro - December 2nd, 2025
December isn't just about Christmas lights: for those working in cybersecurity, it's the month when the human factor collapses and companies rush to buy solutions just to be "compliant" for...

Managing AI Agents: Mitigating Security Risks in Autonomous Systems
Redazione RHC - December 2nd, 2025
The widespread adoption of artificial intelligence in businesses is profoundly transforming operational processes and, at the same time, introducing new security vulnerabilities . Companies are using these systems to increase...

Mistral AI Unveils Powerful Open Source Models for Advanced AI Applications
Redazione RHC - December 2nd, 2025
French company Mistral AI has unveiled its Mistral 3 line of models, making them fully open source under the Apache 2.0 license . The series includes several compact and dense...

Maha Grass APT Group Unleashes StreamSpy Malware Attacks
Redazione RHC - December 2nd, 2025
The Patchwork cyber espionage group — also known as Hangover or Dropping Elephant and internally tracked by QiAnXin as APT-Q-36 — has been active since 2009 and is believed to...

Digital Crime Among Teenagers: Temporary Involvement
Redazione RHC - December 1st, 2025
Dutch authorities have published data showing that adolescents' involvement in cybercrime is usually temporary. An analysis prepared by the House of Representatives indicates that early interest in hacking often fades...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

