Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The world of technology is a veritable battlefield, where coding geniuses challenge malicious attackers every day with exploits and security patches. That’s why the recent discovery of a vulnerabili...

Cybersecurity is a serious issue, especially when it comes to vulnerabilities that can compromise an entire system. Well, Hewlett Packard Enterprise (HPE) has just raised the alarm about a truly worry...

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert including three new vulnerabilities in its catalog of exploited cyber threats (KEVs), highlighting that these fl...

The psychology of passwords starts right here: trying to understand people before systems. Welcome to “The Mind Behind Passwords,” the column that looks at cybersecurity. From a different perspect...

New details emerge from an Amazon Threat Intelligence report that highlight an alarming shift in Russian government-backed cyber operations. High-level 0-day exploits, often attributed to state-sponso...
Google Discover AI Headlines: Revolutionizing News Feed or Clickbait Nightmare?
Storm-0900 Phishing Campaign Spreads XWorm Malware
Windows 10 Still Running on 1 Billion PCs, Upgrade to Windows 11 Urged
Secure AI Integration in OT Systems: Key Principles and Best Practices
Aisuru Botnet Unleashes 29.7 Tbps DDoS Attack, Cloudflare Mitigates
Critical Vulnerability in Iskra iHUB Devices Exposed

Google Discover AI Headlines: Revolutionizing News Feed or Clickbait Nightmare?
Redazione RHC - December 3rd, 2025
Google is testing AI-generated headlines in its Discover feed, replacing original news headlines with original ones. Sean Hollister, editor-in-chief of The Verge, reported this , noting that short and often...

Storm-0900 Phishing Campaign Spreads XWorm Malware
Redazione RHC - December 3rd, 2025
Over the holiday season, a coordinated attack was detected and blocked by Microsoft Threat Intelligence security analysts, involving tens of thousands of emails crafted to deceive recipients. The cybercriminal group...

Windows 10 Still Running on 1 Billion PCs, Upgrade to Windows 11 Urged
Redazione RHC - December 3rd, 2025
Windows 10 has been officially retired, but it still runs on approximately one billion personal computers worldwide. A significant number of devices are technically ready to upgrade to Windows 11,...

Secure AI Integration in OT Systems: Key Principles and Best Practices
Redazione RHC - December 3rd, 2025
Since ChatGPT's public release in November 2022, artificial intelligence (AI) has been integrated into many aspects of human society. For owners and operators of critical infrastructure, AI can be used...

Aisuru Botnet Unleashes 29.7 Tbps DDoS Attack, Cloudflare Mitigates
Redazione RHC - December 2nd, 2025
A botnet service called Aisuru offers an army of compromised IoT devices and routers to launch high-traffic DDoS attacks. In just three months, the massive Aisuru botnet launched more than...

Critical Vulnerability in Iskra iHUB Devices Exposed
Redazione RHC - December 2nd, 2025
A serious security vulnerability has been discovered in smart metering infrastructure, which could expose utility networks to remote takeover risks. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

