Red Hot Cyber. The Cybersecurity Blog
Featured Articles

A recent study by Datadog Security Labs reveals an ongoing operation targeting organizations using Microsoft 365 and Okta for single sign-on (SSO) authentication. This operation uses sophisticated tec...

The React Server component security saga continues this week. Following the patching of a critical remote code execution (RCE) vulnerability that led to React2shell, researchers have discovered two ne...

Cisco Talos has identified a new ransomware campaign called DeadLock : attackers are exploiting a vulnerable Baidu antivirus driver (CVE-2024-51324) to disable EDR systems using the Bring Your Own Vul...

What we wrote in the article ” Patriotic Code: from DDoSia and NoName057(16) to CISM, the algorithm that shapes youth for Putin ” on Red Hot Cyber on July 23rd is now fully consistent with the inf...

Gartner analysts have urged businesses to temporarily stop using browsers with built-in artificial intelligence (AI) capabilities . In a recent advisory, the company emphasizes that such tools pose un...
ENISA takes on the role of Root in the European Cybersecurity Initiative (CVE).
Supply Chain Attack on OpenAI: Analytics Provider Mixpanel Compromised
Be careful when using SSDs! Without power, you risk data loss
Quantum Computing vs. Artificial Intelligence: Which Will Really Change the Future?
ToddyCat APT Group Targets Microsoft 365 Email Security
Tor Boosts Security with Counter Galois Onion CGO Encryption

ENISA takes on the role of Root in the European Cybersecurity Initiative (CVE).
Redazione RHC - November 26th, 2025
The European Union Agency for Cybersecurity (ENISA) has taken on the role of Root within the Common Vulnerabilities and Exposures (CVE) programme, becoming the main point of reference for national...

Supply Chain Attack on OpenAI: Analytics Provider Mixpanel Compromised
Redazione RHC - November 26th, 2025
OpenAI has confirmed a security incident at Mixpanel, a third-party analytics provider used for its APIs. According to the investigation, the cause of the security incident involving OpenAI and Mixpanel...

Be careful when using SSDs! Without power, you risk data loss
Redazione RHC - November 26th, 2025
XDA Developers reminds us that using solid-state drives for long-term storage is risky. If SSDs are left without power for years, data can become corrupted or even disappear entirely. Unlike...

Quantum Computing vs. Artificial Intelligence: Which Will Really Change the Future?
Redazione RHC - November 26th, 2025
Quantum mechanics remains a complex and mysterious field, both difficult to explain and difficult to understand. This branch of physics studies the unusual behavior of tiny particles, phenomena that are...

ToddyCat APT Group Targets Microsoft 365 Email Security
Redazione RHC - November 26th, 2025
Email security continues to be one of the most critical points in modern cyber attacks. While compromising a Windows domain is already a success for a malicious actor, gaining access...

Tor Boosts Security with Counter Galois Onion CGO Encryption
Redazione RHC - November 26th, 2025
The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

