Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
2nd Edition GlitchZone RHC 320x100 2
970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Multi-threaded Hacking: US Pioneers Automated Operations with AI Agents
Di Redazione RHC - 19/11/2025

In recent months, a new cyber operations infrastructure has been developing in the United States, in which automated agents are becoming not just a support tool, but a full-fledged participant in offe...

Immagine del sito
WhatsApp data leak: 3.5 billion numbers “stolen” by researchers at the University of Vienna
Di Redazione RHC - 19/11/2025

The scale of the leak, described by a team from the University of Vienna , demonstrates how dangerous the familiar contact search function of popular messaging apps can be. WhatsApp has always emphasi...

Immagine del sito
Cloudflare goes down in the magnificent cloud! Global incident is being resolved.
Di Redazione RHC - 18/11/2025

November 18, 2025 – After hours of widespread disruptions , the incident affecting Cloudflare’s global network finally appears to be nearing resolution. The company announced it has implemented a ...

Immagine del sito
IBM AIX: Two critical bugs allow execution of arbitrary commands (Score 10 and 9.6)
Di Redazione RHC - 18/11/2025

Two serious vulnerabilities in IBM’s AIX operating system could allow remote attackers to execute arbitrary commands on affected systems, prompting the company to issue important security updates. B...

Immagine del sito
Shakerati Anonimi: Nicoletta’s experience and the credit card thriller
Di Redazione RHC - 18/11/2025

The room is the same: dim lights, chairs in a circle, thermoses of herbal teas now cold from all the talking and venting. We are Shakerati Anonimi , a group of people who never imagined we’d end up ...

Python to Rust: A More Secure Future for the Programming Language

Two CPython developers have proposed adding the Rust programming language to the Python codebase . Emma Smith and a colleague have published a Prelimi...
Redazione RHC - 19/11/2025 - 21:26

Multi-threaded Hacking: US Pioneers Automated Operations with AI Agents

In recent months, a new cyber operations infrastructure has been developing in the United States, in which automated agents are becoming not just a su...
Redazione RHC - 19/11/2025 - 13:59

WhatsApp data leak: 3.5 billion numbers “stolen” by researchers at the University of Vienna

The scale of the leak, described by a team from the University of Vienna , demonstrates how dangerous the familiar contact search function of popular ...
Redazione RHC - 19/11/2025 - 12:33

Google launches Gemini 3, its most advanced artificial intelligence model

Google has announced the launch of Gemini 3, the next generation of its flagship artificial intelligence model, which the company is integrating into ...
Redazione RHC - 19/11/2025 - 10:32

CISA’s ‘Secure by Design’ Pledge: A Year of Progress in Cybersecurity

By Carl Windsor, Chief Information Security Officer at Fortinet Secure-by-design practices represent a fundamental shift in software development: secu...
Redazione RHC - 19/11/2025 - 10:03

Cloudflare global outage: It was an internal technical error. Let’s find out the cause.

On November 18, 2025, at 11:20 UTC , a significant portion of Cloudflare's global infrastructure suddenly ceased to properly route Internet traffic, d...
Redazione RHC - 19/11/2025 - 09:59
1 2 3 247

Python to Rust: A More Secure Future for the Programming Language

- November 19th, 2025

Two CPython developers have proposed adding the Rust programming language to the Python codebase . Emma Smith and a colleague have published a Preliminary Python Enhancement Proposal (Pre-PEP) justifying this...

Facebook Linkedin X

Multi-threaded Hacking: US Pioneers Automated Operations with AI Agents

- November 19th, 2025

In recent months, a new cyber operations infrastructure has been developing in the United States, in which automated agents are becoming not just a support tool, but a full-fledged participant...

Facebook Linkedin X

WhatsApp data leak: 3.5 billion numbers “stolen” by researchers at the University of Vienna

- November 19th, 2025

The scale of the leak, described by a team from the University of Vienna , demonstrates how dangerous the familiar contact search function of popular messaging apps can be. WhatsApp...

Facebook Linkedin X

Google launches Gemini 3, its most advanced artificial intelligence model

- November 19th, 2025

Google has announced the launch of Gemini 3, the next generation of its flagship artificial intelligence model, which the company is integrating into search, the Gemini app, cloud services, and...

Facebook Linkedin X

CISA’s ‘Secure by Design’ Pledge: A Year of Progress in Cybersecurity

- November 19th, 2025

By Carl Windsor, Chief Information Security Officer at Fortinet Secure-by-design practices represent a fundamental shift in software development: security is no longer considered an afterthought, but is integrated from the...

Facebook Linkedin X

Cloudflare global outage: It was an internal technical error. Let’s find out the cause.

- November 19th, 2025

On November 18, 2025, at 11:20 UTC , a significant portion of Cloudflare's global infrastructure suddenly ceased to properly route Internet traffic, displaying an HTTP error page to millions of...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE