Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Ancharia Mobile 1
Fortinet 970x120px

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Cyberattack on Eurofiber France: Find out what happened Cybercrime

Cyberattack on Eurofiber France: Find out what happened

On November 13, Eurofiber France, a respected provider of fiber optic network and VPN solutions to many of France's leading...
Redazione RHC - 24 November 2025
From Risk to Resilience: How Veeam Protects Your Supply Chain from Disruptions Cybercrime

From Risk to Resilience: How Veeam Protects Your Supply Chain from Disruptions

With the increasing digitalization of the supply chain , resilience is no longer just about logistics and suppliers, but also...
Redazione RHC - 24 November 2025
When the Cloud Falls: How a Small Mistake Brought the Global Internet to Its Knees Cybercrime

When the Cloud Falls: How a Small Mistake Brought the Global Internet to Its Knees

This fall, we've had quite a bit of a cloud headache, I don't know if you've noticed. That is, AWS,...
Gaia Russo - 24 November 2025
Father and son break world speed record with homemade drone Cybercrime

Father and son break world speed record with homemade drone

This summer, in the Dubai desert, a flight occurred that few expected to see from a battery-powered quadcopter. The experimental...
Redazione RHC - 23 November 2025
Microsoft Blocks KMS38 Activation Method for Windows 10 and 11 Cybercrime

Microsoft Blocks KMS38 Activation Method for Windows 10 and 11

Users noticed that last week Microsoft developers disabled the offline activation method for Windows 11 and 10 via KMS38, which...
Redazione RHC - 23 November 2025
Future prospects for computer science and technology graduates Cybercrime

Future prospects for computer science and technology graduates

Artificial intelligence is changing the way recent computer science graduates approach the world of work. It's not about sudden job...
Redazione RHC - 23 November 2025

Hanyuan-1: China’s room-temperature quantum computer challenges the US

China's first atomic quantum computer has reached a major commercial milestone, recording its first sales to domestic and international customers, according to state media. The Hubei Daily, a state-run newspaper...
Share on Facebook Share on LinkedIn Share on X

Inside NVIDIA: Jensen Huang leads 36 managers, 36,000 employees, and reads 20,000 emails a day

NVIDIA CEO Jen-Hsun Huang now directly oversees 36 employees across seven key areas: strategy, hardware, software, artificial intelligence, public relations, networking, and executive assistants. This represents a significant shift from...
Share on Facebook Share on LinkedIn Share on X

Userbox shut down and its admin arrested by Moscow police. Something is changing.

In recent months, it would appear that the Russian Federation is cracking down on cybercrime, a departure from what we were used to seeing in the past , when many...
Share on Facebook Share on LinkedIn Share on X

Will Bug Hunters Be Out of Work? OpenAI Introduces Aardvark, Its New Bug Fixer

OpenAI has unveiled Aardvark, an autonomous assistant based on the GPT-5 model , designed to automatically find and fix vulnerabilities in software code. This AI tool, dubbed a "security research...
Share on Facebook Share on LinkedIn Share on X

The Louvre Theft: How Password Governance Can Undermine Security

"When the Key Is 'Louvre' - The Theft That Teaches How Password Governance Can Shake Even the Most Violable Fortresses" On October 19, 2025, the Louvre Museum was the scene...
Share on Facebook Share on LinkedIn Share on X

Xi Jinping proposes a global organization for artificial intelligence

Chinese President Xi Jinping took center stage at Saturday's APEC leaders' meeting, proposing the creation of a global organization to manage artificial intelligence. Beijing is seeking to establish itself as...
Share on Facebook Share on LinkedIn Share on X

The Future of Society in the Age of Artificial Intelligence

Today, many are wondering what impact the spread of Artificial Intelligence will have on our society. Among the most widespread concerns is the loss of millions of jobs and the...
Share on Facebook Share on LinkedIn Share on X

When Google Indexes Even Deception! Ghost Networks Discovered by RHC That Penalize SERPs

RHC analysis of the “BHS Links” network and global Black Hat automated SEO infrastructure An internal Red Hot Cyber analysis of its domain has uncovered a global Black Hat SEO...
Share on Facebook Share on LinkedIn Share on X

Alleged EY Data Leak: 4TB of SQL Backups Exposed on Azure Cloud

In recent days, the alleged data leak by Ernst & Young (EY) has become one of the most discussed topics in the international cybersecurity landscape. I decided to reconstruct the...
Share on Facebook Share on LinkedIn Share on X

Theft at the Louvre: The surveillance system’s password “LOUVRE” has put the museum in crisis.

We recently published an in-depth article on the "theft of the century" at the Louvre , in which we highlighted how physical security – access, environmental control, surveillance – is...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Undertow Vulnerability CVE-2025-12543 Exposes Java Ecosystem to Critical Security Risks
Redazione RHC - 09/01/2026

A flaw has been discovered in the foundation of the Java web ecosystem. Undertow , the high-performance web server that powers enterprise heavyweights like WildFly and JBoss EAP , has been hit by a critical…

Immagine del sitoCybercrime
Iran Protests Escalate as Reza Pahlavi Calls for Action Against Government
Redazione RHC - 09/01/2026

Iranian protesters chanted and marched through the streets until Friday morning, following a call from exiled former Prince Reza Pahlavi to demonstrate, despite the Iranian theocracy cutting off the country from the internet and international…

Immagine del sitoCybercrime
Veeam Backup Vulnerability: Critical RCE Flaw Discovered – Update Now
Redazione RHC - 08/01/2026

Backups are generally considered the last line of defense, but this week Veeam reminded us that backup systems themselves can become entry points for attacks. The company released security updates for Backup & Replication ,…

Immagine del sitoCybercrime
When Attack Discovery Becomes Automated, Detection Stops Scaling
Alexander Rogan - 08/01/2026

For much of the past two decades, cybersecurity has been built on a simple assumption: malicious activity can be detected, analysed, and responded to before meaningful damage occurs. This assumption shaped everything from SOC design…

Immagine del sitoCybercrime
CVE-2026-21858: n8n Vulnerability Exposes Thousands of Servers to RCE
Redazione RHC - 08/01/2026

The vulnerability, identified as CVE-2026-21858, which we recently reported on, affects approximately 100,000 servers worldwide, threatening to expose proprietary API keys, customer databases, and AI workflows. The vulnerability, with a CVSS score of 10, has…