Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The world of technology is a veritable battlefield, where coding geniuses challenge malicious attackers every day with exploits and security patches. That’s why the recent discovery of a vulnerabili...

Cybersecurity is a serious issue, especially when it comes to vulnerabilities that can compromise an entire system. Well, Hewlett Packard Enterprise (HPE) has just raised the alarm about a truly worry...

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert including three new vulnerabilities in its catalog of exploited cyber threats (KEVs), highlighting that these fl...

The psychology of passwords starts right here: trying to understand people before systems. Welcome to “The Mind Behind Passwords,” the column that looks at cybersecurity. From a different perspect...

New details emerge from an Amazon Threat Intelligence report that highlight an alarming shift in Russian government-backed cyber operations. High-level 0-day exploits, often attributed to state-sponso...
AI Smart Glasses for Police: Efficient Vehicle Checks in China
Notepad++ 8.8.9 Released: Fixing Critical Update Vulnerability
Salt Typhoon Hackers Exposed: Cisco Training Led to Global Telecom Breaches
Critical Red Hat OpenShift GitOps Vulnerability Exposed
FortiGate Vulnerability Exploited: Update Now to Prevent SSO Attacks
Shannon: Autonomous Penetration Testing with AI

AI Smart Glasses for Police: Efficient Vehicle Checks in China
Redazione RHC - December 17th, 2025
The Changsha traffic police have begun using AI-powered smart glasses in their daily patrols. This was confirmed by the city's Public Security Bureau , which has already distributed the new...

Notepad++ 8.8.9 Released: Fixing Critical Update Vulnerability
Redazione RHC - December 16th, 2025
A new version, 8.8.9, of the popular text editor Notepad++, has been released by its developers, fixing a flaw in the automatic update system . This issue came to light...

Salt Typhoon Hackers Exposed: Cisco Training Led to Global Telecom Breaches
Redazione RHC - December 16th, 2025
A recent study by SentinelLabs sheds new light on the roots of the hacker group known as “Salt Typhoon ,” which carried out one of the most audacious espionage operations...

Critical Red Hat OpenShift GitOps Vulnerability Exposed
Redazione RHC - December 16th, 2025
A critical flaw has been discovered in Red Hat OpenShift GitOps, putting Kubernetes clusters at risk by allowing users with reduced permissions to gain full control of them. OpenShift GitOps...

FortiGate Vulnerability Exploited: Update Now to Prevent SSO Attacks
Redazione RHC - December 16th, 2025
Threat actors began actively exploiting the high-severity vulnerabilities shortly after the vendor disclosed them to bypass authentication on FortiGate devices. A recent report from Arctic Wolf reveals that, as of...

Shannon: Autonomous Penetration Testing with AI
Redazione RHC - December 15th, 2025
Shannon acts as a penetration tester who doesn't just report vulnerabilities, but launches actual exploits. Shannon's goal is to breach your web application's security before anyone with malicious intent can....
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

