Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The world of technology is a veritable battlefield, where coding geniuses challenge malicious attackers every day with exploits and security patches. That’s why the recent discovery of a vulnerabili...

Cybersecurity is a serious issue, especially when it comes to vulnerabilities that can compromise an entire system. Well, Hewlett Packard Enterprise (HPE) has just raised the alarm about a truly worry...

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert including three new vulnerabilities in its catalog of exploited cyber threats (KEVs), highlighting that these fl...

The psychology of passwords starts right here: trying to understand people before systems. Welcome to “The Mind Behind Passwords,” the column that looks at cybersecurity. From a different perspect...

New details emerge from an Amazon Threat Intelligence report that highlight an alarming shift in Russian government-backed cyber operations. High-level 0-day exploits, often attributed to state-sponso...
OpenAI is working on a neural network for music creation
Oracle VirtualBox Vulnerability: Risk of Virtual Machine Escape
YouTube Ghost Network: The phantom network that infected millions of users
While Pope Francis is alive and continues his ministry, disinformation is rampant.
New submarine cables in the Black Sea: Europe seeks digital independence from Russia
BreachForums Resurrects After Yet Another FBI Shutdown

OpenAI is working on a neural network for music creation
Redazione RHC - October 25th, 2025
According to The Information, OpenAI is actively working on its own neural network for music creation , which will compete with projects like Suno and Udio. The publication's sources report...

Oracle VirtualBox Vulnerability: Risk of Virtual Machine Escape
Redazione RHC - October 25th, 2025
BI.ZONE specialists have identified two vulnerabilities (CVE-2025-62592 and CVE-2025-61760) in Oracle VirtualBox. When combined, they allowed an attacker to exit a virtual machine and reach the ARM-based macOS host system....

YouTube Ghost Network: The phantom network that infected millions of users
Redazione RHC - October 25th, 2025
Google specialists removed over 3,000 videos from YouTube that spread hidden information disguised as hacked software and video game cheats. Check Point researchers dubbed this campaign " YouTube Ghost Network"...

While Pope Francis is alive and continues his ministry, disinformation is rampant.
Redazione RHC - October 25th, 2025
A survey conducted by the European Broadcasting Union (EBU), with support from the BBC, has highlighted that the most popular chatbots tend to distort news , changing its meaning, confusing...

New submarine cables in the Black Sea: Europe seeks digital independence from Russia
Redazione RHC - October 25th, 2025
Eastern Europe is preparing for a new phase in telecommunications security. An ambitious submarine cable project, called Kardesa , will connect Bulgaria, Georgia, Turkey, and Ukraine without crossing Russian territorial...

BreachForums Resurrects After Yet Another FBI Shutdown
Redazione RHC - October 25th, 2025
We've often quoted this phrase: "Fighting cybercrime is like pulling weeds: if you don't completely eradicate them, they'll grow back, much more vigorous than before," and it's more relevant than...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

