Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Google has released Chrome 143 for Windows, macOS, and Linux; the release contains an important patch. The new version ( 143.0.7499.40 for Linux and 143.0.7499.40/41 for Windows and macOS) addresses 1...

December isn’t just about Christmas lights: for those working in cybersecurity, it’s the month when the human factor collapses and companies rush to buy solutions just to be “compliant” for th...

In today’s environment, securing a network requires much more than setting a complex password. A cyber attack against a wireless network follows a structured path that evolves from passive monitorin...

Post 462 on Durov’s official channel immediately went into “scream mode”: “ The end of the free internet. The free internet is becoming a tool of control .” No birthday wishes. Durov explain...

Security researchers have discovered a sophisticated exploit campaign that leverages a private out-of-band application security testing (OAST) service hosted on Google Cloud infrastructure. The campai...
China surpasses US in open-source AI models
ENISA takes on the role of Root in the European Cybersecurity Initiative (CVE).
Supply Chain Attack on OpenAI: Analytics Provider Mixpanel Compromised
Be careful when using SSDs! Without power, you risk data loss
Quantum Computing vs. Artificial Intelligence: Which Will Really Change the Future?
ToddyCat APT Group Targets Microsoft 365 Email Security

China surpasses US in open-source AI models
Redazione RHC - November 27th, 2025
China surpasses the United States in the global market for open-source artificial intelligence (AI) models. According to a November 26 Financial Times report, a study by MIT and open-source AI...

ENISA takes on the role of Root in the European Cybersecurity Initiative (CVE).
Redazione RHC - November 26th, 2025
The European Union Agency for Cybersecurity (ENISA) has taken on the role of Root within the Common Vulnerabilities and Exposures (CVE) programme, becoming the main point of reference for national...

Supply Chain Attack on OpenAI: Analytics Provider Mixpanel Compromised
Redazione RHC - November 26th, 2025
OpenAI has confirmed a security incident at Mixpanel, a third-party analytics provider used for its APIs. According to the investigation, the cause of the security incident involving OpenAI and Mixpanel...

Be careful when using SSDs! Without power, you risk data loss
Redazione RHC - November 26th, 2025
XDA Developers reminds us that using solid-state drives for long-term storage is risky. If SSDs are left without power for years, data can become corrupted or even disappear entirely. Unlike...

Quantum Computing vs. Artificial Intelligence: Which Will Really Change the Future?
Redazione RHC - November 26th, 2025
Quantum mechanics remains a complex and mysterious field, both difficult to explain and difficult to understand. This branch of physics studies the unusual behavior of tiny particles, phenomena that are...

ToddyCat APT Group Targets Microsoft 365 Email Security
Redazione RHC - November 26th, 2025
Email security continues to be one of the most critical points in modern cyber attacks. While compromising a Windows domain is already a success for a malicious actor, gaining access...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

