Red Hot Cyber. The Cybersecurity Blog
Featured Articles

On November 24, Alibaba announced Qwen3Max, which had been in public beta for a week , and had already surpassed 10 million downloads. It was a record that shattered all others. In a very short time, ...

Remote work has given employees freedom , but with it has also come digital surveillance . We discussed this some time ago in an article, reporting that these monitoring tools are also coming to Micro...

On November 13, Eurofiber France, a respected provider of fiber optic network and VPN solutions to many of France’s leading companies, discovered that its systems had been compromised by criminal ha...

This fall, we’ve had quite a bit of a cloud headache, I don’t know if you’ve noticed. That is, AWS, Azure , and then Cloudflare . All of them down, one after the other. A series of outages that ...

Users noticed that last week Microsoft developers disabled the offline activation method for Windows 11 and 10 via KMS38, which has been used by hackers around the world for years. However, the offici...
Drones at Brussels Airport and Military Bases: Security at Risk
Does Microsoft use macOS to create Windows wallpapers? Probably!
Louvre Theft: Windows 2000 and Windows XP on Networks, as Well as Simple Passwords
SesameOp: The Malware That Uses OpenAI Assistants for Command and Control
Chinese hackers target European diplomatic agencies (including Italy)
Eight 0-days worth $35 million sold to Russia by US insiders

Drones at Brussels Airport and Military Bases: Security at Risk
Redazione RHC - November 4th, 2025
On Tuesday evening, due to the presence of a drone in the airspace, air traffic controller Skeyes ordered the temporary suspension of flights departing and arriving at Brussels Airport from...

Does Microsoft use macOS to create Windows wallpapers? Probably!
Redazione RHC - November 4th, 2025
On October 29, Microsoft released a wallpaper to commemorate the eleventh anniversary of the Windows Insider program, and it is speculated that it was created using macOS. Let us remember...

Louvre Theft: Windows 2000 and Windows XP on Networks, as Well as Simple Passwords
Redazione RHC - November 4th, 2025
As we know, the thieves in the "theft of the century" entered through a second-floor window of the Louvre Museum, but the museum had other problems besides unprotected windows. Although...

SesameOp: The Malware That Uses OpenAI Assistants for Command and Control
Redazione RHC - November 4th, 2025
Microsoft has discovered a new malware, dubbed SesameOp , and published details of how it works . This backdoor was unusual: its creators used the OpenAI Assistants API as a...

Chinese hackers target European diplomatic agencies (including Italy)
Redazione RHC - November 4th, 2025
The China-linked hacker group UNC6384 ( also known as Mustang Panda ) is conducting a large-scale cyberespionage campaign targeting European diplomatic and government agencies. According to Arctic Wolf and StrikeReady...

Eight 0-days worth $35 million sold to Russia by US insiders
Redazione RHC - November 4th, 2025
Former US defense contractor CEO Peter Williams has pleaded guilty to selling " eight sensitive, protected cyber exploits" to Russian zero-day broker Operation Zero. Court documents and a TechCrunch investigation...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

