Welcome to Red Hot Cyber | Cybersecurity News
Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Fortinet 320x100px
LECS 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
HPE OneView Vulnerability CVE-2025-37164: Critical Security Update Required
Di Redazione RHC - 18/12/2025

Cybersecurity is a serious issue, especially when it comes to vulnerabilities that can compromise an entire system. Well, Hewlett Packard Enterprise (HPE) has just raised the alarm about a truly worry...

Immagine del sito
CISA Warns of Critical Vulnerabilities in Cisco, SonicWall, and ASUS Devices
Di Redazione RHC - 18/12/2025

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert including three new vulnerabilities in its catalog of exploited cyber threats (KEVs), highlighting that these fl...

Immagine del sito
The Psychology of Passwords: Why Weak Passwords Persist
Di Simone D'Agostino - 17/12/2025

The psychology of passwords starts right here: trying to understand people before systems. Welcome to “The Mind Behind Passwords,” the column that looks at cybersecurity. From a different perspect...

Immagine del sito
Russian Cyber Operations Shift to Targeting Western Critical Infrastructure
Di Redazione RHC - 17/12/2025

New details emerge from an Amazon Threat Intelligence report that highlight an alarming shift in Russian government-backed cyber operations. High-level 0-day exploits, often attributed to state-sponso...

Immagine del sito
Notepad++ 8.8.9 Released: Fixing Critical Update Vulnerability
Di Redazione RHC - 16/12/2025

A new version, 8.8.9, of the popular text editor Notepad++, has been released by its developers, fixing a flaw in the automatic update system . This issue came to light after some users and investigat...

Supply Chain Attack on OpenAI: Analytics Provider Mixpanel Compromised

OpenAI has confirmed a security incident at Mixpanel, a third-party analytics provider used for its APIs. According to the investigation, the cause of...
Redazione RHC - 27/11/2025 - 10:30

Be careful when using SSDs! Without power, you risk data loss

XDA Developers reminds us that using solid-state drives for long-term storage is risky. If SSDs are left without power for years, data can become corr...
Redazione RHC - 27/11/2025 - 09:26

Quantum Computing vs. Artificial Intelligence: Which Will Really Change the Future?

Quantum mechanics remains a complex and mysterious field, both difficult to explain and difficult to understand. This branch of physics studies the un...
Redazione RHC - 27/11/2025 - 07:29

ToddyCat APT Group Targets Microsoft 365 Email Security

Email security continues to be one of the most critical points in modern cyber attacks. While compromising a Windows domain is already a success for a...
Redazione RHC - 27/11/2025 - 06:55

Tor Boosts Security with Counter Galois Onion CGO Encryption

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 R...
Redazione RHC - 27/11/2025 - 06:54

WormGPT 4: AI-Powered Cybercrime Tools on the Rise

Cybercriminals no longer need to convince ChatGPT or Claude Code to write malware or data-stealing scripts. A whole class of specialized language mode...
Redazione RHC - 26/11/2025 - 14:40
1 26 27 28 29 30 283

Supply Chain Attack on OpenAI: Analytics Provider Mixpanel Compromised

- November 26th, 2025

OpenAI has confirmed a security incident at Mixpanel, a third-party analytics provider used for its APIs. According to the investigation, the cause of the security incident involving OpenAI and Mixpanel...

Facebook Linkedin X

Be careful when using SSDs! Without power, you risk data loss

- November 26th, 2025

XDA Developers reminds us that using solid-state drives for long-term storage is risky. If SSDs are left without power for years, data can become corrupted or even disappear entirely. Unlike...

Facebook Linkedin X

Quantum Computing vs. Artificial Intelligence: Which Will Really Change the Future?

- November 26th, 2025

Quantum mechanics remains a complex and mysterious field, both difficult to explain and difficult to understand. This branch of physics studies the unusual behavior of tiny particles, phenomena that are...

Facebook Linkedin X

ToddyCat APT Group Targets Microsoft 365 Email Security

- November 26th, 2025

Email security continues to be one of the most critical points in modern cyber attacks. While compromising a Windows domain is already a success for a malicious actor, gaining access...

Facebook Linkedin X

Tor Boosts Security with Counter Galois Onion CGO Encryption

- November 26th, 2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to...

Facebook Linkedin X

WormGPT 4: AI-Powered Cybercrime Tools on the Rise

- November 25th, 2025

Cybercriminals no longer need to convince ChatGPT or Claude Code to write malware or data-stealing scripts. A whole class of specialized language models, specifically designed for attacks, already exists. One...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE