Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The psychology of passwords starts right here: trying to understand people before systems. Welcome to “The Mind Behind Passwords,” the column that looks at cybersecurity. From a different perspect...

New details emerge from an Amazon Threat Intelligence report that highlight an alarming shift in Russian government-backed cyber operations. High-level 0-day exploits, often attributed to state-sponso...

A new version, 8.8.9, of the popular text editor Notepad++, has been released by its developers, fixing a flaw in the automatic update system . This issue came to light after some users and investigat...

A recent study by SentinelLabs sheds new light on the roots of the hacker group known as “Salt Typhoon ,” which carried out one of the most audacious espionage operations of the past decade. First...

Shannon acts as a penetration tester who doesn’t just report vulnerabilities, but launches actual exploits. Shannon’s goal is to breach your web application’s security before anyone with malicio...
Meta and Google suspend construction of two undersea cables due to instability in the Red Sea
Let the hunt begin! Critical 7-Zip bug puts millions of users at risk.
Python to Rust: A More Secure Future for the Programming Language
Multi-threaded Hacking: US Pioneers Automated Operations with AI Agents
WhatsApp data leak: 3.5 billion numbers “stolen” by researchers at the University of Vienna
Google launches Gemini 3, its most advanced artificial intelligence model

Meta and Google suspend construction of two undersea cables due to instability in the Red Sea
Redazione RHC - November 19th, 2025
Meta and Google have been forced to postpone several major undersea internet cable projects, including 2Africa and Blue-Raman , in the Red Sea corridor through which 20 percent of global...

Let the hunt begin! Critical 7-Zip bug puts millions of users at risk.
Redazione RHC - November 19th, 2025
Millions of users are exposed to the risk of malware infections and system compromise due to hackers' active exploitation of a critical remote code execution (RCE) vulnerability in the popular...

Python to Rust: A More Secure Future for the Programming Language
Redazione RHC - November 18th, 2025
Two CPython developers have proposed adding the Rust programming language to the Python codebase . Emma Smith and a colleague have published a Preliminary Python Enhancement Proposal (Pre-PEP) justifying this...

Multi-threaded Hacking: US Pioneers Automated Operations with AI Agents
Redazione RHC - November 18th, 2025
In recent months, a new cyber operations infrastructure has been developing in the United States, in which automated agents are becoming not just a support tool, but a full-fledged participant...

WhatsApp data leak: 3.5 billion numbers “stolen” by researchers at the University of Vienna
Redazione RHC - November 18th, 2025
The scale of the leak, described by a team from the University of Vienna , demonstrates how dangerous the familiar contact search function of popular messaging apps can be. WhatsApp...

Google launches Gemini 3, its most advanced artificial intelligence model
Redazione RHC - November 18th, 2025
Google has announced the launch of Gemini 3, the next generation of its flagship artificial intelligence model, which the company is integrating into search, the Gemini app, cloud services, and...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

