Red Hot Cyber. The Cybersecurity Blog
Louvre Theft: Windows 2000 and Windows XP on Networks, as Well as Simple Passwords
As we know, the thieves in the “theft of the century” entered through a second-floor window of the Louvre Museum, but the museum had other problems besides unprotected windows. Although Cu...
SesameOp: The Malware That Uses OpenAI Assistants for Command and Control
Microsoft has discovered a new malware, dubbed SesameOp , and published details of how it works . This backdoor was unusual: its creators used the OpenAI Assistants API as a covert control channel , a...
Eight 0-days worth $35 million sold to Russia by US insiders
Former US defense contractor CEO Peter Williams has pleaded guilty to selling ” eight sensitive, protected cyber exploits” to Russian zero-day broker Operation Zero. Court documents and a ...
Trump refuses to export Nvidia chips. China responds: “Don’t worry, we’ll do it ourselves.”
Reuters reported that Trump told reporters during a pre-recorded interview on CBS’s “60 Minutes” and on Air Force One during the return flight: “We’re not going to let an...
Goodbye, malware! In 2025, criminal hackers will use legitimate accounts to remain invisible.
A FortiGuard report for the first half of 2025 shows that financially motivated attackers are increasingly eschewing sophisticated exploits and malware. Instead , they are using valid accounts and leg...
Hanyuan-1: China’s room-temperature quantum computer challenges the US
China’s first atomic quantum computer has reached a major commercial milestone, recording its first sales to domestic and international customers, according to state media. The Hubei Daily, a st...
Inside NVIDIA: Jensen Huang leads 36 managers, 36,000 employees, and reads 20,000 emails a day
NVIDIA CEO Jen-Hsun Huang now directly oversees 36 employees across seven key areas: strategy, hardware, software, artificial intelligence, public relations, networking, and executive assistants. This...
Will Bug Hunters Be Out of Work? OpenAI Introduces Aardvark, Its New Bug Fixer
OpenAI has unveiled Aardvark, an autonomous assistant based on the GPT-5 model , designed to automatically find and fix vulnerabilities in software code. This AI tool, dubbed a “security researc...
The Louvre Theft: How Password Governance Can Undermine Security
“When the Key Is ‘Louvre’ – The Theft That Teaches How Password Governance Can Shake Even the Most Violable Fortresses” On October 19, 2025, the Louvre Museum was the sce...
The Future of Society in the Age of Artificial Intelligence
Today, many are wondering what impact the spread of Artificial Intelligence will have on our society. Among the most widespread concerns is the loss of millions of jobs and the resulting unprecedented...
Featured Articles

As we know, the thieves in the “theft of the century” entered through a second-floor window of the Louvre Museum, but the museum had other problems besides unprotected windows. Although Cu...

Microsoft has discovered a new malware, dubbed SesameOp , and published details of how it works . This backdoor was unusual: its creators used the OpenAI Assistants API as a covert control channel , a...

Former US defense contractor CEO Peter Williams has pleaded guilty to selling ” eight sensitive, protected cyber exploits” to Russian zero-day broker Operation Zero. Court documents and a ...

Reuters reported that Trump told reporters during a pre-recorded interview on CBS’s “60 Minutes” and on Air Force One during the return flight: “We’re not going to let an...

A FortiGuard report for the first half of 2025 shows that financially motivated attackers are increasingly eschewing sophisticated exploits and malware. Instead , they are using valid accounts and leg...
KaruHunters Claims Cyber Attack on RIPE NCC
Microsoft IIS under attack from Chinese criminal hackers: How UAT-8099 exploits authoritative websites
Computer science is no longer a safe career! What’s changing for students and companies?
China cracks down on fake news generated by artificial intelligence
China under surveillance: Users sanctioned for spreading fake news online
Asahi Group under hacker attack: beer supplies at risk

KaruHunters Claims Cyber Attack on RIPE NCC
Redazione RHC - October 4th, 2025
A post recently appeared on a popular underground forum that's attracting the attention of the cybersecurity community. A user with the handle KaruHunters , already known for his activities within...

Microsoft IIS under attack from Chinese criminal hackers: How UAT-8099 exploits authoritative websites
Redazione RHC - October 4th, 2025
A Chinese cybercriminal group known as UAT-8099 has been identified by Cisco Talos as responsible for a large-scale attack campaign. The attacks, which began in April 2025, primarily targeted vulnerable...

Computer science is no longer a safe career! What’s changing for students and companies?
Redazione RHC - October 4th, 2025
For decades, computer science was considered a stable career choice, brimming with opportunities. Today, however, students, universities, and businesses face a radically changed landscape, where once-certain career paths have become...

China cracks down on fake news generated by artificial intelligence
Redazione RHC - October 4th, 2025
The Cyberspace Administration of China has announced the launch of a two-month nationwide campaign, which began on July 24 , aimed at countering the spread of false information published by...

China under surveillance: Users sanctioned for spreading fake news online
Redazione RHC - October 3rd, 2025
In recent months, Hainan public security authorities have launched investigations and imposed administrative sanctions against several internet users responsible for spreading false information that has disrupted public order. Talk about...

Asahi Group under hacker attack: beer supplies at risk
Redazione RHC - October 3rd, 2025
Last Monday, Asahi Group, Japan's largest beer, whisky, and soft drink maker, temporarily suspended its operations in Japan following a cyberattack that compromised its systems , including order processing, shipping,...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

