Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Cybersecurity is a serious issue, especially when it comes to vulnerabilities that can compromise an entire system. Well, Hewlett Packard Enterprise (HPE) has just raised the alarm about a truly worry...

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert including three new vulnerabilities in its catalog of exploited cyber threats (KEVs), highlighting that these fl...

The psychology of passwords starts right here: trying to understand people before systems. Welcome to “The Mind Behind Passwords,” the column that looks at cybersecurity. From a different perspect...

New details emerge from an Amazon Threat Intelligence report that highlight an alarming shift in Russian government-backed cyber operations. High-level 0-day exploits, often attributed to state-sponso...

A new version, 8.8.9, of the popular text editor Notepad++, has been released by its developers, fixing a flaw in the automatic update system . This issue came to light after some users and investigat...
Satoshi Nakamoto’s Net Worth Drops 34% as Cryptocurrency Crash
Cyberattack on Eurofiber France: Find out what happened
From Risk to Resilience: How Veeam Protects Your Supply Chain from Disruptions
When the Cloud Falls: How a Small Mistake Brought the Global Internet to Its Knees
Father and son break world speed record with homemade drone
Microsoft Blocks KMS38 Activation Method for Windows 10 and 11

Satoshi Nakamoto’s Net Worth Drops 34% as Cryptocurrency Crash
Redazione RHC - November 23rd, 2025
The net worth of Satoshi Nakamoto, the mysterious figure known as the founder of Bitcoin, has dropped 34% in the last month due to the recent virtual asset crash ....

Cyberattack on Eurofiber France: Find out what happened
Redazione RHC - November 23rd, 2025
On November 13, Eurofiber France, a respected provider of fiber optic network and VPN solutions to many of France's leading companies, discovered that its systems had been compromised by criminal...

From Risk to Resilience: How Veeam Protects Your Supply Chain from Disruptions
Redazione RHC - November 23rd, 2025
With the increasing digitalization of the supply chain , resilience is no longer just about logistics and suppliers, but also the security and visibility of IT systems. Disruptions are no...

When the Cloud Falls: How a Small Mistake Brought the Global Internet to Its Knees
Gaia Russo - November 23rd, 2025
This fall, we've had quite a bit of a cloud headache, I don't know if you've noticed. That is, AWS, Azure , and then Cloudflare . All of them down,...

Father and son break world speed record with homemade drone
Redazione RHC - November 22nd, 2025
This summer, in the Dubai desert, a flight occurred that few expected to see from a battery-powered quadcopter. The experimental Peregreen 3 reached a speed of 360.4 miles per hour...

Microsoft Blocks KMS38 Activation Method for Windows 10 and 11
Redazione RHC - November 22nd, 2025
Users noticed that last week Microsoft developers disabled the offline activation method for Windows 11 and 10 via KMS38, which has been used by hackers around the world for years....
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

