Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Cybersecurity is a serious issue, especially when it comes to vulnerabilities that can compromise an entire system. Well, Hewlett Packard Enterprise (HPE) has just raised the alarm about a truly worry...

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert including three new vulnerabilities in its catalog of exploited cyber threats (KEVs), highlighting that these fl...

The psychology of passwords starts right here: trying to understand people before systems. Welcome to “The Mind Behind Passwords,” the column that looks at cybersecurity. From a different perspect...

New details emerge from an Amazon Threat Intelligence report that highlight an alarming shift in Russian government-backed cyber operations. High-level 0-day exploits, often attributed to state-sponso...

A new version, 8.8.9, of the popular text editor Notepad++, has been released by its developers, fixing a flaw in the automatic update system . This issue came to light after some users and investigat...
Supply Chain Attack on OpenAI: Analytics Provider Mixpanel Compromised
Be careful when using SSDs! Without power, you risk data loss
Quantum Computing vs. Artificial Intelligence: Which Will Really Change the Future?
ToddyCat APT Group Targets Microsoft 365 Email Security
Tor Boosts Security with Counter Galois Onion CGO Encryption
WormGPT 4: AI-Powered Cybercrime Tools on the Rise

Supply Chain Attack on OpenAI: Analytics Provider Mixpanel Compromised
Redazione RHC - November 26th, 2025
OpenAI has confirmed a security incident at Mixpanel, a third-party analytics provider used for its APIs. According to the investigation, the cause of the security incident involving OpenAI and Mixpanel...

Be careful when using SSDs! Without power, you risk data loss
Redazione RHC - November 26th, 2025
XDA Developers reminds us that using solid-state drives for long-term storage is risky. If SSDs are left without power for years, data can become corrupted or even disappear entirely. Unlike...

Quantum Computing vs. Artificial Intelligence: Which Will Really Change the Future?
Redazione RHC - November 26th, 2025
Quantum mechanics remains a complex and mysterious field, both difficult to explain and difficult to understand. This branch of physics studies the unusual behavior of tiny particles, phenomena that are...

ToddyCat APT Group Targets Microsoft 365 Email Security
Redazione RHC - November 26th, 2025
Email security continues to be one of the most critical points in modern cyber attacks. While compromising a Windows domain is already a success for a malicious actor, gaining access...

Tor Boosts Security with Counter Galois Onion CGO Encryption
Redazione RHC - November 26th, 2025
The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to...

WormGPT 4: AI-Powered Cybercrime Tools on the Rise
Redazione RHC - November 25th, 2025
Cybercriminals no longer need to convince ChatGPT or Claude Code to write malware or data-stealing scripts. A whole class of specialized language models, specifically designed for attacks, already exists. One...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

