Red Hot Cyber. The Cybersecurity Blog
Microsoft Exchange Server Penetration Testing: Techniques, Tools, and Countermeasures
Often, during penetration testing, we find ourselves with elevated access (Domain Admin) within an organization. Some companies stop there, thinking that obtaining Domain Admin is the ultimate goal. B...
Notepad++ under attack! How a fake DLL opens the door to criminal hackers
A new vulnerability affecting Notepad++ was released in September. The vulnerability has been identified as CVE-2025-56383, and details can be found on the NIST website. CVE-2025-56383 is a DLL hijack...
A dangerous zero-day zero-click exploit threatens billions of Android devices
Google has issued an urgent advisory regarding a critical vulnerability in Android that allows attackers to execute arbitrary code on the device without any user interaction. The Zero Click vulnerabil...
Does Microsoft use macOS to create Windows wallpapers? Probably!
On October 29, Microsoft released a wallpaper to commemorate the eleventh anniversary of the Windows Insider program, and it is speculated that it was created using macOS. Let us remember that Windows...
Louvre Theft: Windows 2000 and Windows XP on Networks, as Well as Simple Passwords
As we know, the thieves in the “theft of the century” entered through a second-floor window of the Louvre Museum, but the museum had other problems besides unprotected windows. Although Cu...
SesameOp: The Malware That Uses OpenAI Assistants for Command and Control
Microsoft has discovered a new malware, dubbed SesameOp , and published details of how it works . This backdoor was unusual: its creators used the OpenAI Assistants API as a covert control channel , a...
Eight 0-days worth $35 million sold to Russia by US insiders
Former US defense contractor CEO Peter Williams has pleaded guilty to selling ” eight sensitive, protected cyber exploits” to Russian zero-day broker Operation Zero. Court documents and a ...
Trump refuses to export Nvidia chips. China responds: “Don’t worry, we’ll do it ourselves.”
Reuters reported that Trump told reporters during a pre-recorded interview on CBS’s “60 Minutes” and on Air Force One during the return flight: “We’re not going to let an...
Goodbye, malware! In 2025, criminal hackers will use legitimate accounts to remain invisible.
A FortiGuard report for the first half of 2025 shows that financially motivated attackers are increasingly eschewing sophisticated exploits and malware. Instead , they are using valid accounts and leg...
Hanyuan-1: China’s room-temperature quantum computer challenges the US
China’s first atomic quantum computer has reached a major commercial milestone, recording its first sales to domestic and international customers, according to state media. The Hubei Daily, a st...
Featured Articles

Often, during penetration testing, we find ourselves with elevated access (Domain Admin) within an organization. Some companies stop there, thinking that obtaining Domain Admin is the ultimate goal. B...

A new vulnerability affecting Notepad++ was released in September. The vulnerability has been identified as CVE-2025-56383, and details can be found on the NIST website. CVE-2025-56383 is a DLL hijack...

Google has issued an urgent advisory regarding a critical vulnerability in Android that allows attackers to execute arbitrary code on the device without any user interaction. The Zero Click vulnerabil...

On October 29, Microsoft released a wallpaper to commemorate the eleventh anniversary of the Windows Insider program, and it is speculated that it was created using macOS. Let us remember that Windows...

As we know, the thieves in the “theft of the century” entered through a second-floor window of the Louvre Museum, but the museum had other problems besides unprotected windows. Although Cu...
Anatomy of a Data Theft: Technical Analysis of the “Formbook” Infostealer
OpenAI is working on a neural network for music creation
Oracle VirtualBox Vulnerability: Risk of Virtual Machine Escape
YouTube Ghost Network: The phantom network that infected millions of users
While Pope Francis is alive and continues his ministry, disinformation is rampant.
New submarine cables in the Black Sea: Europe seeks digital independence from Russia

Anatomy of a Data Theft: Technical Analysis of the “Formbook” Infostealer
Redazione RHC - October 27th, 2025
In the cyber threat landscape, few malware programs are as persistent and widespread as Formbook . What began as a simple keylogger and form grabber has evolved into a powerful...

OpenAI is working on a neural network for music creation
Redazione RHC - October 26th, 2025
According to The Information, OpenAI is actively working on its own neural network for music creation , which will compete with projects like Suno and Udio. The publication's sources report...

Oracle VirtualBox Vulnerability: Risk of Virtual Machine Escape
Redazione RHC - October 26th, 2025
BI.ZONE specialists have identified two vulnerabilities (CVE-2025-62592 and CVE-2025-61760) in Oracle VirtualBox. When combined, they allowed an attacker to exit a virtual machine and reach the ARM-based macOS host system....

YouTube Ghost Network: The phantom network that infected millions of users
Redazione RHC - October 26th, 2025
Google specialists removed over 3,000 videos from YouTube that spread hidden information disguised as hacked software and video game cheats. Check Point researchers dubbed this campaign " YouTube Ghost Network"...

While Pope Francis is alive and continues his ministry, disinformation is rampant.
Redazione RHC - October 26th, 2025
A survey conducted by the European Broadcasting Union (EBU), with support from the BBC, has highlighted that the most popular chatbots tend to distort news , changing its meaning, confusing...

New submarine cables in the Black Sea: Europe seeks digital independence from Russia
Redazione RHC - October 26th, 2025
Eastern Europe is preparing for a new phase in telecommunications security. An ambitious submarine cable project, called Kardesa , will connect Bulgaria, Georgia, Turkey, and Ukraine without crossing Russian territorial...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

