Red Hot Cyber. The Cybersecurity Blog
Does Microsoft use macOS to create Windows wallpapers? Probably!
On October 29, Microsoft released a wallpaper to commemorate the eleventh anniversary of the Windows Insider program, and it is speculated that it was created using macOS. Let us remember that Windows...
Louvre Theft: Windows 2000 and Windows XP on Networks, as Well as Simple Passwords
As we know, the thieves in the “theft of the century” entered through a second-floor window of the Louvre Museum, but the museum had other problems besides unprotected windows. Although Cu...
SesameOp: The Malware That Uses OpenAI Assistants for Command and Control
Microsoft has discovered a new malware, dubbed SesameOp , and published details of how it works . This backdoor was unusual: its creators used the OpenAI Assistants API as a covert control channel , a...
Eight 0-days worth $35 million sold to Russia by US insiders
Former US defense contractor CEO Peter Williams has pleaded guilty to selling ” eight sensitive, protected cyber exploits” to Russian zero-day broker Operation Zero. Court documents and a ...
Trump refuses to export Nvidia chips. China responds: “Don’t worry, we’ll do it ourselves.”
Reuters reported that Trump told reporters during a pre-recorded interview on CBS’s “60 Minutes” and on Air Force One during the return flight: “We’re not going to let an...
Goodbye, malware! In 2025, criminal hackers will use legitimate accounts to remain invisible.
A FortiGuard report for the first half of 2025 shows that financially motivated attackers are increasingly eschewing sophisticated exploits and malware. Instead , they are using valid accounts and leg...
Hanyuan-1: China’s room-temperature quantum computer challenges the US
China’s first atomic quantum computer has reached a major commercial milestone, recording its first sales to domestic and international customers, according to state media. The Hubei Daily, a st...
Inside NVIDIA: Jensen Huang leads 36 managers, 36,000 employees, and reads 20,000 emails a day
NVIDIA CEO Jen-Hsun Huang now directly oversees 36 employees across seven key areas: strategy, hardware, software, artificial intelligence, public relations, networking, and executive assistants. This...
Will Bug Hunters Be Out of Work? OpenAI Introduces Aardvark, Its New Bug Fixer
OpenAI has unveiled Aardvark, an autonomous assistant based on the GPT-5 model , designed to automatically find and fix vulnerabilities in software code. This AI tool, dubbed a “security researc...
The Louvre Theft: How Password Governance Can Undermine Security
“When the Key Is ‘Louvre’ – The Theft That Teaches How Password Governance Can Shake Even the Most Violable Fortresses” On October 19, 2025, the Louvre Museum was the sce...
Featured Articles

On October 29, Microsoft released a wallpaper to commemorate the eleventh anniversary of the Windows Insider program, and it is speculated that it was created using macOS. Let us remember that Windows...

As we know, the thieves in the “theft of the century” entered through a second-floor window of the Louvre Museum, but the museum had other problems besides unprotected windows. Although Cu...

Microsoft has discovered a new malware, dubbed SesameOp , and published details of how it works . This backdoor was unusual: its creators used the OpenAI Assistants API as a covert control channel , a...

Former US defense contractor CEO Peter Williams has pleaded guilty to selling ” eight sensitive, protected cyber exploits” to Russian zero-day broker Operation Zero. Court documents and a ...

Reuters reported that Trump told reporters during a pre-recorded interview on CBS’s “60 Minutes” and on Air Force One during the return flight: “We’re not going to let an...
China under surveillance: Users sanctioned for spreading fake news online
Asahi Group under hacker attack: beer supplies at risk
Criminal Hackers Target Seniors! Datzbro Arrives: Facebook and Smartphones Targeted
100 bug researchers, $32 million! HackerOne: AI bugs are on the rise!
Beyond the Screen: The Postal Police Event for a Healthy Life Beyond Social Media
They’re offering you €55,000 for access to your office account. What should you do?

China under surveillance: Users sanctioned for spreading fake news online
Redazione RHC - October 3rd, 2025
In recent months, Hainan public security authorities have launched investigations and imposed administrative sanctions against several internet users responsible for spreading false information that has disrupted public order. Talk about...

Asahi Group under hacker attack: beer supplies at risk
Redazione RHC - October 3rd, 2025
Last Monday, Asahi Group, Japan's largest beer, whisky, and soft drink maker, temporarily suspended its operations in Japan following a cyberattack that compromised its systems , including order processing, shipping,...

Criminal Hackers Target Seniors! Datzbro Arrives: Facebook and Smartphones Targeted
Redazione RHC - October 3rd, 2025
A new malicious campaign is using Facebook as a vehicle to spread Datzbro , an Android malware that combines the features of a banking Trojan with those of spyware. The...

100 bug researchers, $32 million! HackerOne: AI bugs are on the rise!
Redazione RHC - October 3rd, 2025
Vulnerability bounty platform HackerOne reported that white hat hackers worldwide received $81 million in compensation over the past 12 months. According to the company, this represents a 13% increase over...

Beyond the Screen: The Postal Police Event for a Healthy Life Beyond Social Media
Marcello Filacchioni - October 3rd, 2025
The Red Hot Cyber Community had the opportunity to participate in "Beyond the Screen," the Postal Police's important initiative for young people on October 2nd , with the aim of...

They’re offering you €55,000 for access to your office account. What should you do?
Redazione RHC - October 3rd, 2025
BBC journalist Joe Tidy found himself in a situation usually hidden in the shadows of cybercrime. In July, he received an unexpected message on the messaging app Signal from an...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

