Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Until now, ChatGPT has been ad-free: no banners, no hidden promotions. Even the paid versions worked without pushy offers. But that could change soon. As reported by user X (formerly of Twitter) under...

The Russian Federation’s Roskomnadzor has announced that it continues to impose systematic restrictions on the messaging app WhatsApp due to violations of Russian law. According to the agency, the s...

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...
Louvre Theft: Windows 2000 and Windows XP on Networks, as Well as Simple Passwords
SesameOp: The Malware That Uses OpenAI Assistants for Command and Control
Chinese hackers target European diplomatic agencies (including Italy)
Eight 0-days worth $35 million sold to Russia by US insiders
Trump refuses to export Nvidia chips. China responds: “Don’t worry, we’ll do it ourselves.”
Goodbye, malware! In 2025, criminal hackers will use legitimate accounts to remain invisible.

Louvre Theft: Windows 2000 and Windows XP on Networks, as Well as Simple Passwords
Redazione RHC - November 3rd, 2025
As we know, the thieves in the "theft of the century" entered through a second-floor window of the Louvre Museum, but the museum had other problems besides unprotected windows. Although...

SesameOp: The Malware That Uses OpenAI Assistants for Command and Control
Redazione RHC - November 3rd, 2025
Microsoft has discovered a new malware, dubbed SesameOp , and published details of how it works . This backdoor was unusual: its creators used the OpenAI Assistants API as a...

Chinese hackers target European diplomatic agencies (including Italy)
Redazione RHC - November 3rd, 2025
The China-linked hacker group UNC6384 ( also known as Mustang Panda ) is conducting a large-scale cyberespionage campaign targeting European diplomatic and government agencies. According to Arctic Wolf and StrikeReady...

Eight 0-days worth $35 million sold to Russia by US insiders
Redazione RHC - November 3rd, 2025
Former US defense contractor CEO Peter Williams has pleaded guilty to selling " eight sensitive, protected cyber exploits" to Russian zero-day broker Operation Zero. Court documents and a TechCrunch investigation...

Trump refuses to export Nvidia chips. China responds: “Don’t worry, we’ll do it ourselves.”
Redazione RHC - November 3rd, 2025
Reuters reported that Trump told reporters during a pre-recorded interview on CBS's "60 Minutes" and on Air Force One during the return flight: "We're not going to let any country...

Goodbye, malware! In 2025, criminal hackers will use legitimate accounts to remain invisible.
Redazione RHC - November 3rd, 2025
A FortiGuard report for the first half of 2025 shows that financially motivated attackers are increasingly eschewing sophisticated exploits and malware. Instead , they are using valid accounts and legitimate...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

