Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The psychology of passwords starts right here: trying to understand people before systems. Welcome to “The Mind Behind Passwords,” the column that looks at cybersecurity. From a different perspect...

New details emerge from an Amazon Threat Intelligence report that highlight an alarming shift in Russian government-backed cyber operations. High-level 0-day exploits, often attributed to state-sponso...

A new version, 8.8.9, of the popular text editor Notepad++, has been released by its developers, fixing a flaw in the automatic update system . This issue came to light after some users and investigat...

A recent study by SentinelLabs sheds new light on the roots of the hacker group known as “Salt Typhoon ,” which carried out one of the most audacious espionage operations of the past decade. First...

Shannon acts as a penetration tester who doesn’t just report vulnerabilities, but launches actual exploits. Shannon’s goal is to breach your web application’s security before anyone with malicio...
China Accuses US of Cyber Attacks, Denies Involvement in Brickstorm Malware
AI Browser Attack: Google Drive Wiper Threat Exposed
NATO Cyber Coalition Exercise: Enhancing Cyber Defense with 1,300 Experts
Microsoft 365 Price Hike: What You Need to Know About the 2026 Increase
React2Shell Vulnerability Exploited by China-Linked Hackers, Patch Now
FreeBSD 15.0: Discover the Power of This Unix-like Operating System

China Accuses US of Cyber Attacks, Denies Involvement in Brickstorm Malware
Redazione RHC - December 5th, 2025
A spokesperson for the Chinese Embassy in Canada responded to a reporter's question about the outcry in Canada over so-called "Chinese cyber attacks." A reporter asked : Recently, the Canadian...

AI Browser Attack: Google Drive Wiper Threat Exposed
Redazione RHC - December 5th, 2025
Researchers at Striker STAR Labs have described a new agent-based browser attack that can turn a regular email into a near-complete wiper of your Google Drive inbox. The attack targets...

NATO Cyber Coalition Exercise: Enhancing Cyber Defense with 1,300 Experts
Redazione RHC - December 5th, 2025
NATO held its largest-ever cyber defense exercise, Cyber Coalition, in Estonia, involving approximately 1,300 specialists . The goal was to practice protecting critical infrastructure from large-scale cyber attacks, simulating scenarios...

Microsoft 365 Price Hike: What You Need to Know About the 2026 Increase
Redazione RHC - December 5th, 2025
Starting July 1, 2026, Microsoft 365 and Office 365 subscription prices for business and government customers will increase by 8% to 33% , depending on the plan. This price adjustment...

React2Shell Vulnerability Exploited by China-Linked Hackers, Patch Now
Redazione RHC - December 5th, 2025
We often discuss on this site that the window between the publication of an exploit and the launch of active attacks is drastically shrinking. For this reason, it's increasingly crucial...

FreeBSD 15.0: Discover the Power of This Unix-like Operating System
Redazione RHC - December 5th, 2025
Behind many of the digital applications and services we take for granted every day lies a silent giant: FreeBSD . Known primarily to insiders, this Unix-like operating system has become...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

