Red Hot Cyber. The Cybersecurity Blog
Featured Articles
In today’s environment, securing a network requires much more than setting a complex password. A cyber attack against a wireless network follows a structured path that evolves from passive monitorin...

Post 462 on Durov’s official channel immediately went into “scream mode”: “ The end of the free internet. The free internet is becoming a tool of control .” No birthday wishes. Durov explain...

Security researchers have discovered a sophisticated exploit campaign that leverages a private out-of-band application security testing (OAST) service hosted on Google Cloud infrastructure. The campai...

The underground cybercrime market continues to evolve rapidly, fueled by specialized groups designing and selling tools for increasingly sophisticated digital scams. Among these, a particularly active...

American aviation and defense components manufacturer ADC Aerospace has found itself in the spotlight due to a possible cyber attack by the Play ransomware group, which appeared on their blog where cr...
Trump refuses to export Nvidia chips. China responds: “Don’t worry, we’ll do it ourselves.”
Goodbye, malware! In 2025, criminal hackers will use legitimate accounts to remain invisible.
Cyberstalking Against Women: Analysis and Legal Implications
WSUS security update has broken hotpatches on Windows Server 2025
Hanyuan-1: China’s room-temperature quantum computer challenges the US
Inside NVIDIA: Jensen Huang leads 36 managers, 36,000 employees, and reads 20,000 emails a day

Trump refuses to export Nvidia chips. China responds: “Don’t worry, we’ll do it ourselves.”
Redazione RHC - November 3rd, 2025
Reuters reported that Trump told reporters during a pre-recorded interview on CBS's "60 Minutes" and on Air Force One during the return flight: "We're not going to let any country...

Goodbye, malware! In 2025, criminal hackers will use legitimate accounts to remain invisible.
Redazione RHC - November 3rd, 2025
A FortiGuard report for the first half of 2025 shows that financially motivated attackers are increasingly eschewing sophisticated exploits and malware. Instead , they are using valid accounts and legitimate...

Cyberstalking Against Women: Analysis and Legal Implications
Paolo Galdieri - November 3rd, 2025
This is the third in a series of articles analyzing gender-based violence in the digital context, in anticipation of November 25th, the International Day for the Elimination of Violence against...

WSUS security update has broken hotpatches on Windows Server 2025
Redazione RHC - November 2nd, 2025
A breakthrough patch fixed a security flaw in the Windows Server Update Service (WSUS), but apparently caused hotpatching to stop working on certain Windows Server 2025 servers. Microsoft Hotpatch is...

Hanyuan-1: China’s room-temperature quantum computer challenges the US
Redazione RHC - November 2nd, 2025
China's first atomic quantum computer has reached a major commercial milestone, recording its first sales to domestic and international customers, according to state media. The Hubei Daily, a state-run newspaper...

Inside NVIDIA: Jensen Huang leads 36 managers, 36,000 employees, and reads 20,000 emails a day
Redazione RHC - November 2nd, 2025
NVIDIA CEO Jen-Hsun Huang now directly oversees 36 employees across seven key areas: strategy, hardware, software, artificial intelligence, public relations, networking, and executive assistants. This represents a significant shift from...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

