Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Ancharia Mobile 1
970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Louvre Theft: Windows 2000 and Windows XP on Networks, as Well as Simple Passwords
Di Redazione RHC - 04/11/2025

As we know, the thieves in the “theft of the century” entered through a second-floor window of the Louvre Museum, but the museum had other problems besides unprotected windows. Although Cu...

Immagine del sito
SesameOp: The Malware That Uses OpenAI Assistants for Command and Control
Di Redazione RHC - 04/11/2025

Microsoft has discovered a new malware, dubbed SesameOp , and published details of how it works . This backdoor was unusual: its creators used the OpenAI Assistants API as a covert control channel , a...

Immagine del sito
Eight 0-days worth $35 million sold to Russia by US insiders
Di Redazione RHC - 04/11/2025

Former US defense contractor CEO Peter Williams has pleaded guilty to selling ” eight sensitive, protected cyber exploits” to Russian zero-day broker Operation Zero. Court documents and a ...

Immagine del sito
Trump refuses to export Nvidia chips. China responds: “Don’t worry, we’ll do it ourselves.”
Di Redazione RHC - 04/11/2025

Reuters reported that Trump told reporters during a pre-recorded interview on CBS’s “60 Minutes” and on Air Force One during the return flight: “We’re not going to let an...

Immagine del sito
Goodbye, malware! In 2025, criminal hackers will use legitimate accounts to remain invisible.
Di Redazione RHC - 04/11/2025

A FortiGuard report for the first half of 2025 shows that financially motivated attackers are increasingly eschewing sophisticated exploits and malware. Instead , they are using valid accounts and leg...

Louvre Theft: Windows 2000 and Windows XP on Networks, as Well as Simple Passwords

As we know, the thieves in the "theft of the century" entered through a second-floor window of the Louvre Museum, but the museum had other problems be...
Redazione RHC - 04/11/2025 - 19:05

SesameOp: The Malware That Uses OpenAI Assistants for Command and Control

Microsoft has discovered a new malware, dubbed SesameOp , and published details of how it works . This backdoor was unusual: its creators used the Ope...
Redazione RHC - 04/11/2025 - 18:39

Chinese hackers target European diplomatic agencies (including Italy)

The China-linked hacker group UNC6384 ( also known as Mustang Panda ) is conducting a large-scale cyberespionage campaign targeting European diplomati...
Redazione RHC - 04/11/2025 - 15:27

Eight 0-days worth $35 million sold to Russia by US insiders

Former US defense contractor CEO Peter Williams has pleaded guilty to selling " eight sensitive, protected cyber exploits" to Russian zero-day broker ...
Redazione RHC - 04/11/2025 - 11:19

Trump refuses to export Nvidia chips. China responds: “Don’t worry, we’ll do it ourselves.”

Reuters reported that Trump told reporters during a pre-recorded interview on CBS's "60 Minutes" and on Air Force One during the return flight: "We're...
Redazione RHC - 04/11/2025 - 07:41

Goodbye, malware! In 2025, criminal hackers will use legitimate accounts to remain invisible.

A FortiGuard report for the first half of 2025 shows that financially motivated attackers are increasingly eschewing sophisticated exploits and malwar...
Redazione RHC - 04/11/2025 - 07:22
1 2 3 219

Louvre Theft: Windows 2000 and Windows XP on Networks, as Well as Simple Passwords

- November 4th, 2025

As we know, the thieves in the "theft of the century" entered through a second-floor window of the Louvre Museum, but the museum had other problems besides unprotected windows. Although...

Facebook Linkedin X

SesameOp: The Malware That Uses OpenAI Assistants for Command and Control

- November 4th, 2025

Microsoft has discovered a new malware, dubbed SesameOp , and published details of how it works . This backdoor was unusual: its creators used the OpenAI Assistants API as a...

Facebook Linkedin X

Chinese hackers target European diplomatic agencies (including Italy)

- November 4th, 2025

The China-linked hacker group UNC6384 ( also known as Mustang Panda ) is conducting a large-scale cyberespionage campaign targeting European diplomatic and government agencies. According to Arctic Wolf and StrikeReady...

Facebook Linkedin X

Eight 0-days worth $35 million sold to Russia by US insiders

- November 4th, 2025

Former US defense contractor CEO Peter Williams has pleaded guilty to selling " eight sensitive, protected cyber exploits" to Russian zero-day broker Operation Zero. Court documents and a TechCrunch investigation...

Facebook Linkedin X

Trump refuses to export Nvidia chips. China responds: “Don’t worry, we’ll do it ourselves.”

- November 4th, 2025

Reuters reported that Trump told reporters during a pre-recorded interview on CBS's "60 Minutes" and on Air Force One during the return flight: "We're not going to let any country...

Facebook Linkedin X

Goodbye, malware! In 2025, criminal hackers will use legitimate accounts to remain invisible.

- November 4th, 2025

A FortiGuard report for the first half of 2025 shows that financially motivated attackers are increasingly eschewing sophisticated exploits and malware. Instead , they are using valid accounts and legitimate...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE