Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Despite significant geopolitical challenges, the mercenary spyware industry remains a resilient and persistent threat; in this context, the well-known vendor Intellexa continues to expand its arsenal....

Australia is soon to introduce groundbreaking legislation banning social media access for children under 16, an initiative that will set a precedent worldwide. A similar measure will soon be adopted i...

An increasingly aggressive campaign, directly targeting remote access infrastructure, has prompted threat actors to actively attempt to exploit vulnerabilities in Palo Alto Networks’ GlobalProtect V...

The U.S. Department of Justice has accused twin brothers Muneeb and Sohaib Akhter of deleting 96 databases containing sensitive information, including investigative records and documents requested und...

According to Eurostat, in 2023 only 55% of European Union citizens aged 16 to 74 had at least basic digital skills, with strong differences between countries: values ranging from around 83% in t...
Let the hunt begin! Critical 7-Zip bug puts millions of users at risk.
Python to Rust: A More Secure Future for the Programming Language
Multi-threaded Hacking: US Pioneers Automated Operations with AI Agents
WhatsApp data leak: 3.5 billion numbers “stolen” by researchers at the University of Vienna
Google launches Gemini 3, its most advanced artificial intelligence model
CISA’s ‘Secure by Design’ Pledge: A Year of Progress in Cybersecurity

Let the hunt begin! Critical 7-Zip bug puts millions of users at risk.
Redazione RHC - November 19th, 2025
Millions of users are exposed to the risk of malware infections and system compromise due to hackers' active exploitation of a critical remote code execution (RCE) vulnerability in the popular...

Python to Rust: A More Secure Future for the Programming Language
Redazione RHC - November 18th, 2025
Two CPython developers have proposed adding the Rust programming language to the Python codebase . Emma Smith and a colleague have published a Preliminary Python Enhancement Proposal (Pre-PEP) justifying this...

Multi-threaded Hacking: US Pioneers Automated Operations with AI Agents
Redazione RHC - November 18th, 2025
In recent months, a new cyber operations infrastructure has been developing in the United States, in which automated agents are becoming not just a support tool, but a full-fledged participant...

WhatsApp data leak: 3.5 billion numbers “stolen” by researchers at the University of Vienna
Redazione RHC - November 18th, 2025
The scale of the leak, described by a team from the University of Vienna , demonstrates how dangerous the familiar contact search function of popular messaging apps can be. WhatsApp...

Google launches Gemini 3, its most advanced artificial intelligence model
Redazione RHC - November 18th, 2025
Google has announced the launch of Gemini 3, the next generation of its flagship artificial intelligence model, which the company is integrating into search, the Gemini app, cloud services, and...

CISA’s ‘Secure by Design’ Pledge: A Year of Progress in Cybersecurity
Redazione RHC - November 18th, 2025
By Carl Windsor, Chief Information Security Officer at Fortinet Secure-by-design practices represent a fundamental shift in software development: security is no longer considered an afterthought, but is integrated from the...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

