Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Crowdstrike 320×100
Banner Desktop

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Alibaba Qwen3Max Dominates AI Market with Rapid Growth
Di Redazione RHC - 24/11/2025

On November 24, Alibaba announced Qwen3Max, which had been in public beta for a week , and had already surpassed 10 million downloads. It was a record that shattered all others. In a very short time, ...

Immagine del sito
Digital Surveillance at Work: The Rise of Algorithmic Monitoring
Di Redazione RHC - 24/11/2025

Remote work has given employees freedom , but with it has also come digital surveillance . We discussed this some time ago in an article, reporting that these monitoring tools are also coming to Micro...

Immagine del sito
Cyberattack on Eurofiber France: Find out what happened
Di Redazione RHC - 24/11/2025

On November 13, Eurofiber France, a respected provider of fiber optic network and VPN solutions to many of France’s leading companies, discovered that its systems had been compromised by criminal ha...

Immagine del sito
When the Cloud Falls: How a Small Mistake Brought the Global Internet to Its Knees
Di Gaia Russo - 24/11/2025

This fall, we’ve had quite a bit of a cloud headache, I don’t know if you’ve noticed. That is, AWS, Azure , and then Cloudflare . All of them down, one after the other. A series of outages that ...

Immagine del sito
Microsoft Blocks KMS38 Activation Method for Windows 10 and 11
Di Redazione RHC - 23/11/2025

Users noticed that last week Microsoft developers disabled the offline activation method for Windows 11 and 10 via KMS38, which has been used by hackers around the world for years. However, the offici...

Drones at Brussels Airport and Military Bases: Security at Risk

On Tuesday evening, due to the presence of a drone in the airspace, air traffic controller Skeyes ordered the temporary suspension of flights departin...
Redazione RHC - 04/11/2025 - 22:42

Does Microsoft use macOS to create Windows wallpapers? Probably!

On October 29, Microsoft released a wallpaper to commemorate the eleventh anniversary of the Windows Insider program, and it is speculated that it was...
Redazione RHC - 04/11/2025 - 22:32

Louvre Theft: Windows 2000 and Windows XP on Networks, as Well as Simple Passwords

As we know, the thieves in the "theft of the century" entered through a second-floor window of the Louvre Museum, but the museum had other problems be...
Redazione RHC - 04/11/2025 - 19:05

SesameOp: The Malware That Uses OpenAI Assistants for Command and Control

Microsoft has discovered a new malware, dubbed SesameOp , and published details of how it works . This backdoor was unusual: its creators used the Ope...
Redazione RHC - 04/11/2025 - 18:39

Chinese hackers target European diplomatic agencies (including Italy)

The China-linked hacker group UNC6384 ( also known as Mustang Panda ) is conducting a large-scale cyberespionage campaign targeting European diplomati...
Redazione RHC - 04/11/2025 - 15:27

Eight 0-days worth $35 million sold to Russia by US insiders

Former US defense contractor CEO Peter Williams has pleaded guilty to selling " eight sensitive, protected cyber exploits" to Russian zero-day broker ...
Redazione RHC - 04/11/2025 - 11:19
1 33 34 35 36 37 253

Drones at Brussels Airport and Military Bases: Security at Risk

- November 4th, 2025

On Tuesday evening, due to the presence of a drone in the airspace, air traffic controller Skeyes ordered the temporary suspension of flights departing and arriving at Brussels Airport from...

Facebook Linkedin X

Does Microsoft use macOS to create Windows wallpapers? Probably!

- November 4th, 2025

On October 29, Microsoft released a wallpaper to commemorate the eleventh anniversary of the Windows Insider program, and it is speculated that it was created using macOS. Let us remember...

Facebook Linkedin X

Louvre Theft: Windows 2000 and Windows XP on Networks, as Well as Simple Passwords

- November 4th, 2025

As we know, the thieves in the "theft of the century" entered through a second-floor window of the Louvre Museum, but the museum had other problems besides unprotected windows. Although...

Facebook Linkedin X

SesameOp: The Malware That Uses OpenAI Assistants for Command and Control

- November 4th, 2025

Microsoft has discovered a new malware, dubbed SesameOp , and published details of how it works . This backdoor was unusual: its creators used the OpenAI Assistants API as a...

Facebook Linkedin X

Chinese hackers target European diplomatic agencies (including Italy)

- November 4th, 2025

The China-linked hacker group UNC6384 ( also known as Mustang Panda ) is conducting a large-scale cyberespionage campaign targeting European diplomatic and government agencies. According to Arctic Wolf and StrikeReady...

Facebook Linkedin X

Eight 0-days worth $35 million sold to Russia by US insiders

- November 4th, 2025

Former US defense contractor CEO Peter Williams has pleaded guilty to selling " eight sensitive, protected cyber exploits" to Russian zero-day broker Operation Zero. Court documents and a TechCrunch investigation...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE