Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The world of technology is a veritable battlefield, where coding geniuses challenge malicious attackers every day with exploits and security patches. That’s why the recent discovery of a vulnerabili...

Cybersecurity is a serious issue, especially when it comes to vulnerabilities that can compromise an entire system. Well, Hewlett Packard Enterprise (HPE) has just raised the alarm about a truly worry...

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert including three new vulnerabilities in its catalog of exploited cyber threats (KEVs), highlighting that these fl...

The psychology of passwords starts right here: trying to understand people before systems. Welcome to “The Mind Behind Passwords,” the column that looks at cybersecurity. From a different perspect...

New details emerge from an Amazon Threat Intelligence report that highlight an alarming shift in Russian government-backed cyber operations. High-level 0-day exploits, often attributed to state-sponso...
Eight 0-days worth $35 million sold to Russia by US insiders
Trump refuses to export Nvidia chips. China responds: “Don’t worry, we’ll do it ourselves.”
Goodbye, malware! In 2025, criminal hackers will use legitimate accounts to remain invisible.
Cyberstalking Against Women: Analysis and Legal Implications
WSUS security update has broken hotpatches on Windows Server 2025
Hanyuan-1: China’s room-temperature quantum computer challenges the US

Eight 0-days worth $35 million sold to Russia by US insiders
Redazione RHC - November 3rd, 2025
Former US defense contractor CEO Peter Williams has pleaded guilty to selling " eight sensitive, protected cyber exploits" to Russian zero-day broker Operation Zero. Court documents and a TechCrunch investigation...

Trump refuses to export Nvidia chips. China responds: “Don’t worry, we’ll do it ourselves.”
Redazione RHC - November 3rd, 2025
Reuters reported that Trump told reporters during a pre-recorded interview on CBS's "60 Minutes" and on Air Force One during the return flight: "We're not going to let any country...

Goodbye, malware! In 2025, criminal hackers will use legitimate accounts to remain invisible.
Redazione RHC - November 3rd, 2025
A FortiGuard report for the first half of 2025 shows that financially motivated attackers are increasingly eschewing sophisticated exploits and malware. Instead , they are using valid accounts and legitimate...

Cyberstalking Against Women: Analysis and Legal Implications
Paolo Galdieri - November 3rd, 2025
This is the third in a series of articles analyzing gender-based violence in the digital context, in anticipation of November 25th, the International Day for the Elimination of Violence against...

WSUS security update has broken hotpatches on Windows Server 2025
Redazione RHC - November 2nd, 2025
A breakthrough patch fixed a security flaw in the Windows Server Update Service (WSUS), but apparently caused hotpatching to stop working on certain Windows Server 2025 servers. Microsoft Hotpatch is...

Hanyuan-1: China’s room-temperature quantum computer challenges the US
Redazione RHC - November 2nd, 2025
China's first atomic quantum computer has reached a major commercial milestone, recording its first sales to domestic and international customers, according to state media. The Hubei Daily, a state-run newspaper...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

