Red Hot Cyber. The Cybersecurity Blog
Hanyuan-1: China’s room-temperature quantum computer challenges the US
China’s first atomic quantum computer has reached a major commercial milestone, recording its first sales to domestic and international customers, according to state media. The Hubei Daily, a st...
Inside NVIDIA: Jensen Huang leads 36 managers, 36,000 employees, and reads 20,000 emails a day
NVIDIA CEO Jen-Hsun Huang now directly oversees 36 employees across seven key areas: strategy, hardware, software, artificial intelligence, public relations, networking, and executive assistants. This...
Will Bug Hunters Be Out of Work? OpenAI Introduces Aardvark, Its New Bug Fixer
OpenAI has unveiled Aardvark, an autonomous assistant based on the GPT-5 model , designed to automatically find and fix vulnerabilities in software code. This AI tool, dubbed a “security researc...
The Louvre Theft: How Password Governance Can Undermine Security
“When the Key Is ‘Louvre’ – The Theft That Teaches How Password Governance Can Shake Even the Most Violable Fortresses” On October 19, 2025, the Louvre Museum was the sce...
The Future of Society in the Age of Artificial Intelligence
Today, many are wondering what impact the spread of Artificial Intelligence will have on our society. Among the most widespread concerns is the loss of millions of jobs and the resulting unprecedented...
When Google Indexes Even Deception! Ghost Networks Discovered by RHC That Penalize SERPs
RHC analysis of the “BHS Links” network and global Black Hat automated SEO infrastructure An internal Red Hot Cyber analysis of its domain has uncovered a global Black Hat SEO network called “BHS Link...
Theft at the Louvre: The surveillance system’s password “LOUVRE” has put the museum in crisis.
We recently published an in-depth article on the “theft of the century” at the Louvre , in which we highlighted how physical security – access, environmental control, surveillance – is now...
Discover the Dark Web: Access, Secrets, and Helpful Links to the Onion Network
Have you always thought that the Dark Web is frequented by cybercriminals? Have you always thought that the Dark Web is a dangerous and treacherous network? Today we want to dispel this myth and raise...
AWS and Azure Disruption: Vendor Dependence Is a Serious Risk
On October 29, a massive outage of Microsoft ‘s Azure cloud platform caused global disruptions, disrupting business and public services for over eight hours. The incident affected numerous custo...
Windows 7 Shrinks to 69MB: A Minimalist’s Achievement
Windows minimalists have set another record. Enthusiast @XenoPanther has reduced the size of a running copy of Windows 7 to 69 megabytes , smaller than the average mobile app. By comparison, a standar...
Featured Articles

China’s first atomic quantum computer has reached a major commercial milestone, recording its first sales to domestic and international customers, according to state media. The Hubei Daily, a st...

NVIDIA CEO Jen-Hsun Huang now directly oversees 36 employees across seven key areas: strategy, hardware, software, artificial intelligence, public relations, networking, and executive assistants. This...

OpenAI has unveiled Aardvark, an autonomous assistant based on the GPT-5 model , designed to automatically find and fix vulnerabilities in software code. This AI tool, dubbed a “security researc...

“When the Key Is ‘Louvre’ – The Theft That Teaches How Password Governance Can Shake Even the Most Violable Fortresses” On October 19, 2025, the Louvre Museum was the sce...

Today, many are wondering what impact the spread of Artificial Intelligence will have on our society. Among the most widespread concerns is the loss of millions of jobs and the resulting unprecedented...
A new phishing campaign on NPM involves 175 malicious packages.
We’re All in the Truman Show! Cybersecurity Lessons from Seahaven Cyber Prison
AI Alignment: Where Does AI Learn Right and Wrong?
Microsoft Patch Tuesday: 175 vulnerabilities fixed and two zero-days exploited
Microsoft warns about uncontrolled use of ‘shadow’ AI in the workplace
12 security bugs discovered in Ivanti Endpoint Manager (EPM). Update now!

A new phishing campaign on NPM involves 175 malicious packages.
Redazione RHC - October 15th, 2025
Attackers are abusing the legitimate npm infrastructure in a new phishing campaign on Beamglea. This time, the malicious packages don't execute malicious code, but instead exploit the legitimate CDN service...

We’re All in the Truman Show! Cybersecurity Lessons from Seahaven Cyber Prison
Daniela Farina - October 14th, 2025
The 1998 film "The Truman Show" is a terrifying premonition of the dangers of pervasive surveillance, algorithmic manipulation, and the erosion of consensus in a modern context of digital interconnection....

AI Alignment: Where Does AI Learn Right and Wrong?
Sergio Corpettini - October 14th, 2025
The other day on LinkedIn, I found myself having a conversation with someone who was seriously interested in the topic of artificial intelligence applied to law. It wasn't one of...

Microsoft Patch Tuesday: 175 vulnerabilities fixed and two zero-days exploited
Redazione RHC - October 14th, 2025
In its latest update, the tech giant fixed 175 vulnerabilities affecting its core products and underlying systems, including two actively exploited zero-day vulnerabilities , the company said in its latest...

Microsoft warns about uncontrolled use of ‘shadow’ AI in the workplace
Redazione RHC - October 14th, 2025
While Microsoft actively promotes its Copilot tools for businesses, the company also warns of the dangers of uncontrolled use of "shadow" AI by employees. A new report raises the alarm...

12 security bugs discovered in Ivanti Endpoint Manager (EPM). Update now!
Redazione RHC - October 14th, 2025
Ivanti has published 13 vulnerabilities in its Endpoint Manager (EPM) software , including two high-severity flaws that could allow remote code execution and privilege escalation . Despite the lack of...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
  
