Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The world of technology is a veritable battlefield, where coding geniuses challenge malicious attackers every day with exploits and security patches. That’s why the recent discovery of a vulnerabili...

Cybersecurity is a serious issue, especially when it comes to vulnerabilities that can compromise an entire system. Well, Hewlett Packard Enterprise (HPE) has just raised the alarm about a truly worry...

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert including three new vulnerabilities in its catalog of exploited cyber threats (KEVs), highlighting that these fl...

The psychology of passwords starts right here: trying to understand people before systems. Welcome to “The Mind Behind Passwords,” the column that looks at cybersecurity. From a different perspect...

New details emerge from an Amazon Threat Intelligence report that highlight an alarming shift in Russian government-backed cyber operations. High-level 0-day exploits, often attributed to state-sponso...
OpenAI releases Sora Mobile App on Android, available in multiple countries
Drones at Brussels Airport and Military Bases: Security at Risk
Does Microsoft use macOS to create Windows wallpapers? Probably!
Louvre Theft: Windows 2000 and Windows XP on Networks, as Well as Simple Passwords
SesameOp: The Malware That Uses OpenAI Assistants for Command and Control
Chinese hackers target European diplomatic agencies (including Italy)

OpenAI releases Sora Mobile App on Android, available in multiple countries
Redazione RHC - November 4th, 2025
OpenAI has released the Sora mobile app on Android devices. CNBC reported that OpenAI's Sora app is now available for download through the Google Play app store and that the...

Drones at Brussels Airport and Military Bases: Security at Risk
Redazione RHC - November 3rd, 2025
On Tuesday evening, due to the presence of a drone in the airspace, air traffic controller Skeyes ordered the temporary suspension of flights departing and arriving at Brussels Airport from...

Does Microsoft use macOS to create Windows wallpapers? Probably!
Redazione RHC - November 3rd, 2025
On October 29, Microsoft released a wallpaper to commemorate the eleventh anniversary of the Windows Insider program, and it is speculated that it was created using macOS. Let us remember...

Louvre Theft: Windows 2000 and Windows XP on Networks, as Well as Simple Passwords
Redazione RHC - November 3rd, 2025
As we know, the thieves in the "theft of the century" entered through a second-floor window of the Louvre Museum, but the museum had other problems besides unprotected windows. Although...

SesameOp: The Malware That Uses OpenAI Assistants for Command and Control
Redazione RHC - November 3rd, 2025
Microsoft has discovered a new malware, dubbed SesameOp , and published details of how it works . This backdoor was unusual: its creators used the OpenAI Assistants API as a...

Chinese hackers target European diplomatic agencies (including Italy)
Redazione RHC - November 3rd, 2025
The China-linked hacker group UNC6384 ( also known as Mustang Panda ) is conducting a large-scale cyberespionage campaign targeting European diplomatic and government agencies. According to Arctic Wolf and StrikeReady...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

