Red Hot Cyber. The Cybersecurity Blog
Microsoft Exchange Server Penetration Testing: Techniques, Tools, and Countermeasures
Often, during penetration testing, we find ourselves with elevated access (Domain Admin) within an organization. Some companies stop there, thinking that obtaining Domain Admin is the ultimate goal. B...
Notepad++ under attack! How a fake DLL opens the door to criminal hackers
A new vulnerability affecting Notepad++ was released in September. The vulnerability has been identified as CVE-2025-56383, and details can be found on the NIST website. CVE-2025-56383 is a DLL hijack...
A dangerous zero-day zero-click exploit threatens billions of Android devices
Google has issued an urgent advisory regarding a critical vulnerability in Android that allows attackers to execute arbitrary code on the device without any user interaction. The Zero Click vulnerabil...
Does Microsoft use macOS to create Windows wallpapers? Probably!
On October 29, Microsoft released a wallpaper to commemorate the eleventh anniversary of the Windows Insider program, and it is speculated that it was created using macOS. Let us remember that Windows...
Louvre Theft: Windows 2000 and Windows XP on Networks, as Well as Simple Passwords
As we know, the thieves in the “theft of the century” entered through a second-floor window of the Louvre Museum, but the museum had other problems besides unprotected windows. Although Cu...
SesameOp: The Malware That Uses OpenAI Assistants for Command and Control
Microsoft has discovered a new malware, dubbed SesameOp , and published details of how it works . This backdoor was unusual: its creators used the OpenAI Assistants API as a covert control channel , a...
Eight 0-days worth $35 million sold to Russia by US insiders
Former US defense contractor CEO Peter Williams has pleaded guilty to selling ” eight sensitive, protected cyber exploits” to Russian zero-day broker Operation Zero. Court documents and a ...
Trump refuses to export Nvidia chips. China responds: “Don’t worry, we’ll do it ourselves.”
Reuters reported that Trump told reporters during a pre-recorded interview on CBS’s “60 Minutes” and on Air Force One during the return flight: “We’re not going to let an...
Goodbye, malware! In 2025, criminal hackers will use legitimate accounts to remain invisible.
A FortiGuard report for the first half of 2025 shows that financially motivated attackers are increasingly eschewing sophisticated exploits and malware. Instead , they are using valid accounts and leg...
Hanyuan-1: China’s room-temperature quantum computer challenges the US
China’s first atomic quantum computer has reached a major commercial milestone, recording its first sales to domestic and international customers, according to state media. The Hubei Daily, a st...
Featured Articles

Often, during penetration testing, we find ourselves with elevated access (Domain Admin) within an organization. Some companies stop there, thinking that obtaining Domain Admin is the ultimate goal. B...

A new vulnerability affecting Notepad++ was released in September. The vulnerability has been identified as CVE-2025-56383, and details can be found on the NIST website. CVE-2025-56383 is a DLL hijack...

Google has issued an urgent advisory regarding a critical vulnerability in Android that allows attackers to execute arbitrary code on the device without any user interaction. The Zero Click vulnerabil...

On October 29, Microsoft released a wallpaper to commemorate the eleventh anniversary of the Windows Insider program, and it is speculated that it was created using macOS. Let us remember that Windows...

As we know, the thieves in the “theft of the century” entered through a second-floor window of the Louvre Museum, but the museum had other problems besides unprotected windows. Although Cu...
Google CodeMender is here! When AI finds bugs in code and fixes them itself.
A single data center on fire, an entire country in digital blackout: the case of South Korea
The Rise of Digital Partners: AI Becomes Wiresexuals’ Safe, Convenient, and Controllable Haven
Amazon founder Jeff Bezos: AI hype is a bubble!
Why does the United States buy rare earths from China despite its own reserves?
RediShell: A 13-year-old score 10 RCE has been upgraded to Redis

Google CodeMender is here! When AI finds bugs in code and fixes them itself.
Redazione RHC - October 7th, 2025
It would be fantastic to have an AI agent capable of automatically analyzing our projects' code, identifying security bugs, generating fixes, and immediately releasing them into production. Yet, it seems...

A single data center on fire, an entire country in digital blackout: the case of South Korea
Redazione RHC - October 7th, 2025
A fire at a government data center in South Korea has reduced the country's digital infrastructure to rubble and starkly demonstrated the dangers of relying on a single hub. The...

The Rise of Digital Partners: AI Becomes Wiresexuals’ Safe, Convenient, and Controllable Haven
Redazione RHC - October 7th, 2025
Disillusionment with online dating is increasingly pushing women to seek emotional intimacy in the virtual world. More and more women are turning to artificial intelligence, namely chatbots designed for romantic...

Amazon founder Jeff Bezos: AI hype is a bubble!
Redazione RHC - October 7th, 2025
During the Italian Tech Week in Turin, Jeff Bezos, founder of Amazon and one of the richest men in the world (with an estimated net worth of $235.4 billion according...

Why does the United States buy rare earths from China despite its own reserves?
Redazione RHC - October 7th, 2025
In recent years, the topic of rare earths has returned to the forefront of international debate, especially given China's dominant role in this strategic sector. Many wonder: why does the...

RediShell: A 13-year-old score 10 RCE has been upgraded to Redis
Redazione RHC - October 7th, 2025
A 13-year-old critical flaw, known as RediShell , in Redis allows remote code execution (RCE) , giving attackers the ability to gain full control of the underlying host system. The...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

