Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The recent theft at the Louvre Museum, located in the heart of Paris, has shocked not only the art world but also the cybersecurity world. On the night of October 22, 2025, several French crown jewels...

Three former DigitalMint employees, who investigated ransomware incidents and negotiated with ransomware groups, are accused of hacking into the networks of five American companies. According to the U...

Cisco has published two new critical vulnerabilities affecting Cisco Unified Contact Center Express (CCX) , the platform used by thousands of companies to manage contact centers and unified communicat...

In Beijing, in a banquet hall of a luxury hotel, police officers from across the country attended a conference dedicated to the application of artificial intelligence to public safety . The event open...

The Rust Foundation has announced the launch of the Maintainers Fund, a new program designed to support developers responsible for the stability and development of the Rust ecosystem. This step aims t...
Australia: Microsoft accused of deceptive practices in Microsoft 365 renewals
Criminal Hackers Breach US Nuclear Weapons Production Facilities
The secret behind Space Invaders’ speed? A technical limitation of the hardware
$2.8 billion in cryptocurrency stolen! Here’s how North Korea circumvents UN sanctions.
CoPhish is coming! Microsoft Copilot Studio used to steal accounts
Anatomy of a Data Theft: Technical Analysis of the “Formbook” Infostealer

Australia: Microsoft accused of deceptive practices in Microsoft 365 renewals
Redazione RHC - October 27th, 2025
Australia's competition watchdog, the ACCC, said subscribers to Microsoft 365 Personal and Family plans were being asked to pay higher prices for Copilot or cancel their subscriptions. According to the...

Criminal Hackers Breach US Nuclear Weapons Production Facilities
Redazione RHC - October 27th, 2025
Government hackers breached a nuclear weapons component manufacturing facility in the United States by exploiting vulnerabilities in Microsoft SharePoint. The incident affected the Kansas City National Security Campus (KCNSC) ,...

The secret behind Space Invaders’ speed? A technical limitation of the hardware
Redazione RHC - October 27th, 2025
In 1978, Taito's Space Invaders captivated audiences with its seemingly ingenious gameplay: the more aliens you shot down, the faster the remaining ones moved. A crescendo of tension that marked...

$2.8 billion in cryptocurrency stolen! Here’s how North Korea circumvents UN sanctions.
Redazione RHC - October 27th, 2025
Member countries of the international monitoring group MSMT have concluded that North Korea is increasing its use of cybercrime and the remote work of its citizens abroad to circumvent international...

CoPhish is coming! Microsoft Copilot Studio used to steal accounts
Redazione RHC - October 27th, 2025
Attackers are using an advanced phishing technique, known as CoPhish, that leverages Microsoft Copilot Studio to trick users into granting unauthorized access to their Microsoft Sign In ID accounts. A...

Anatomy of a Data Theft: Technical Analysis of the “Formbook” Infostealer
Redazione RHC - October 27th, 2025
In the cyber threat landscape, few malware programs are as persistent and widespread as Formbook . What began as a simple keylogger and form grabber has evolved into a powerful...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

