Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
UtiliaCS 320x100
Banner Ransomfeed 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Louvre Theft: Windows 2000 and Windows XP on Networks, as Well as Simple Passwords
Di Redazione RHC - 04/11/2025

As we know, the thieves in the “theft of the century” entered through a second-floor window of the Louvre Museum, but the museum had other problems besides unprotected windows. Although Cu...

Immagine del sito
SesameOp: The Malware That Uses OpenAI Assistants for Command and Control
Di Redazione RHC - 04/11/2025

Microsoft has discovered a new malware, dubbed SesameOp , and published details of how it works . This backdoor was unusual: its creators used the OpenAI Assistants API as a covert control channel , a...

Immagine del sito
Eight 0-days worth $35 million sold to Russia by US insiders
Di Redazione RHC - 04/11/2025

Former US defense contractor CEO Peter Williams has pleaded guilty to selling ” eight sensitive, protected cyber exploits” to Russian zero-day broker Operation Zero. Court documents and a ...

Immagine del sito
Trump refuses to export Nvidia chips. China responds: “Don’t worry, we’ll do it ourselves.”
Di Redazione RHC - 04/11/2025

Reuters reported that Trump told reporters during a pre-recorded interview on CBS’s “60 Minutes” and on Air Force One during the return flight: “We’re not going to let an...

Immagine del sito
Goodbye, malware! In 2025, criminal hackers will use legitimate accounts to remain invisible.
Di Redazione RHC - 04/11/2025

A FortiGuard report for the first half of 2025 shows that financially motivated attackers are increasingly eschewing sophisticated exploits and malware. Instead , they are using valid accounts and leg...

KaruHunters Claims Cyber Attack on RIPE NCC

A post recently appeared on a popular underground forum that's attracting the attention of the cybersecurity community. A user with the handle KaruHun...
Redazione RHC - 04/10/2025 - 09:23

Microsoft IIS under attack from Chinese criminal hackers: How UAT-8099 exploits authoritative websites

A Chinese cybercriminal group known as UAT-8099 has been identified by Cisco Talos as responsible for a large-scale attack campaign. The attacks, whic...
Redazione RHC - 04/10/2025 - 09:08

Computer science is no longer a safe career! What’s changing for students and companies?

For decades, computer science was considered a stable career choice, brimming with opportunities. Today, however, students, universities, and business...
Redazione RHC - 04/10/2025 - 08:49

China cracks down on fake news generated by artificial intelligence

The Cyberspace Administration of China has announced the launch of a two-month nationwide campaign, which began on July 24 , aimed at countering the s...
Redazione RHC - 04/10/2025 - 08:32

China under surveillance: Users sanctioned for spreading fake news online

In recent months, Hainan public security authorities have launched investigations and imposed administrative sanctions against several internet users ...
Redazione RHC - 03/10/2025 - 18:26

Asahi Group under hacker attack: beer supplies at risk

Last Monday, Asahi Group, Japan's largest beer, whisky, and soft drink maker, temporarily suspended its operations in Japan following a cyberattack th...
Redazione RHC - 03/10/2025 - 17:12
1 45 46 47 48 49 219

KaruHunters Claims Cyber Attack on RIPE NCC

- October 4th, 2025

A post recently appeared on a popular underground forum that's attracting the attention of the cybersecurity community. A user with the handle KaruHunters , already known for his activities within...

Facebook Linkedin X

Microsoft IIS under attack from Chinese criminal hackers: How UAT-8099 exploits authoritative websites

- October 4th, 2025

A Chinese cybercriminal group known as UAT-8099 has been identified by Cisco Talos as responsible for a large-scale attack campaign. The attacks, which began in April 2025, primarily targeted vulnerable...

Facebook Linkedin X

Computer science is no longer a safe career! What’s changing for students and companies?

- October 4th, 2025

For decades, computer science was considered a stable career choice, brimming with opportunities. Today, however, students, universities, and businesses face a radically changed landscape, where once-certain career paths have become...

Facebook Linkedin X

China cracks down on fake news generated by artificial intelligence

- October 4th, 2025

The Cyberspace Administration of China has announced the launch of a two-month nationwide campaign, which began on July 24 , aimed at countering the spread of false information published by...

Facebook Linkedin X

China under surveillance: Users sanctioned for spreading fake news online

- October 3rd, 2025

In recent months, Hainan public security authorities have launched investigations and imposed administrative sanctions against several internet users responsible for spreading false information that has disrupted public order. Talk about...

Facebook Linkedin X

Asahi Group under hacker attack: beer supplies at risk

- October 3rd, 2025

Last Monday, Asahi Group, Japan's largest beer, whisky, and soft drink maker, temporarily suspended its operations in Japan following a cyberattack that compromised its systems , including order processing, shipping,...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE