Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
2nd Edition GlitchZone RHC 320x100 2
Banner Desktop

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
ChatGPT to Introduce Targeted Ads, Changing Monetization Strategy
Di Redazione RHC - 29/11/2025

Until now, ChatGPT has been ad-free: no banners, no hidden promotions. Even the paid versions worked without pushy offers. But that could change soon. As reported by user X (formerly of Twitter) under...

Immagine del sito
WhatsApp Blocked in Russia: Messaging App Faces Crackdown
Di Redazione RHC - 28/11/2025

The Russian Federation’s Roskomnadzor has announced that it continues to impose systematic restrictions on the messaging app WhatsApp due to violations of Russian law. According to the agency, the s...

Immagine del sito
Shai-Hulud Worm Spreads Beyond npm, Attacks Maven
Di Redazione RHC - 28/11/2025

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Immagine del sito
11.7% of jobs could be replaced by artificial intelligence
Di Redazione RHC - 28/11/2025

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Louvre Theft: Windows 2000 and Windows XP on Networks, as Well as Simple Passwords

As we know, the thieves in the "theft of the century" entered through a second-floor window of the Louvre Museum, but the museum had other problems be...
Redazione RHC - 04/11/2025 - 19:05

SesameOp: The Malware That Uses OpenAI Assistants for Command and Control

Microsoft has discovered a new malware, dubbed SesameOp , and published details of how it works . This backdoor was unusual: its creators used the Ope...
Redazione RHC - 04/11/2025 - 18:39

Chinese hackers target European diplomatic agencies (including Italy)

The China-linked hacker group UNC6384 ( also known as Mustang Panda ) is conducting a large-scale cyberespionage campaign targeting European diplomati...
Redazione RHC - 04/11/2025 - 15:27

Eight 0-days worth $35 million sold to Russia by US insiders

Former US defense contractor CEO Peter Williams has pleaded guilty to selling " eight sensitive, protected cyber exploits" to Russian zero-day broker ...
Redazione RHC - 04/11/2025 - 11:19

Trump refuses to export Nvidia chips. China responds: “Don’t worry, we’ll do it ourselves.”

Reuters reported that Trump told reporters during a pre-recorded interview on CBS's "60 Minutes" and on Air Force One during the return flight: "We're...
Redazione RHC - 04/11/2025 - 07:41

Goodbye, malware! In 2025, criminal hackers will use legitimate accounts to remain invisible.

A FortiGuard report for the first half of 2025 shows that financially motivated attackers are increasingly eschewing sophisticated exploits and malwar...
Redazione RHC - 04/11/2025 - 07:22
1 39 40 41 42 43 258

Louvre Theft: Windows 2000 and Windows XP on Networks, as Well as Simple Passwords

- November 3rd, 2025

As we know, the thieves in the "theft of the century" entered through a second-floor window of the Louvre Museum, but the museum had other problems besides unprotected windows. Although...

Facebook Linkedin X

SesameOp: The Malware That Uses OpenAI Assistants for Command and Control

- November 3rd, 2025

Microsoft has discovered a new malware, dubbed SesameOp , and published details of how it works . This backdoor was unusual: its creators used the OpenAI Assistants API as a...

Facebook Linkedin X

Chinese hackers target European diplomatic agencies (including Italy)

- November 3rd, 2025

The China-linked hacker group UNC6384 ( also known as Mustang Panda ) is conducting a large-scale cyberespionage campaign targeting European diplomatic and government agencies. According to Arctic Wolf and StrikeReady...

Facebook Linkedin X

Eight 0-days worth $35 million sold to Russia by US insiders

- November 3rd, 2025

Former US defense contractor CEO Peter Williams has pleaded guilty to selling " eight sensitive, protected cyber exploits" to Russian zero-day broker Operation Zero. Court documents and a TechCrunch investigation...

Facebook Linkedin X

Trump refuses to export Nvidia chips. China responds: “Don’t worry, we’ll do it ourselves.”

- November 3rd, 2025

Reuters reported that Trump told reporters during a pre-recorded interview on CBS's "60 Minutes" and on Air Force One during the return flight: "We're not going to let any country...

Facebook Linkedin X

Goodbye, malware! In 2025, criminal hackers will use legitimate accounts to remain invisible.

- November 3rd, 2025

A FortiGuard report for the first half of 2025 shows that financially motivated attackers are increasingly eschewing sophisticated exploits and malware. Instead , they are using valid accounts and legitimate...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE