Red Hot Cyber. The Cybersecurity Blog
Gemini 3.0 Pro: What people who are trying it say
In recent days, a select few users have reported having access to the new Gemini 3.0 Pro model. Initial impressions suggest a significant improvement over the previous generation, so much so that many...
China promotes global AI governance under the United Nations
On October 27, the Blue Hall Forum on the theme of “Improving Global Governance and Building a Community with a Shared Future for Humanity” was held at the Ministry of Foreign Affairs in B...
Criminal Hackers Breach US Nuclear Weapons Production Facilities
Government hackers breached a nuclear weapons component manufacturing facility in the United States by exploiting vulnerabilities in Microsoft SharePoint. The incident affected the Kansas City Nationa...
BreachForums Resurrects After Yet Another FBI Shutdown
We’ve often quoted this phrase: “Fighting cybercrime is like pulling weeds: if you don’t completely eradicate them, they’ll grow back, much more vigorous than before,” an...
Gemini 3.0 Pro: Google prepares for the generational leap and aims to surpass GPT-5 and Claude 4.5
Over the past few days, some users have received a notification saying that their Gemini Advanced devices have been “upgraded from the previous generation model to the 3.0 Pro, the smartest mode...
Critical RCE exploit in Microsoft WSUS actively exploited. CISA warns: imminent risk
A global alert has been issued by the United States Cybersecurity and Infrastructure Security Agency (CISA) regarding the active exploitation of a critical remote code execution (RCE) flaw in Microsof...
No flesh, no bones, just code! Channel 4’s first AI presenter arrives.
On Monday 20 October, Channel 4 broadcast a full-length documentary hosted by a creative TV presenter powered entirely by artificial intelligence. ” I’m not real. For the first time on a B...
Russia and Cybercrime: A Balance Between Selective Repression and State Interest
The Russian cybercrime ecosystem has entered a phase of profound transformation, triggered by a combination of factors: unprecedented international pressure from law enforcement agencies, a shift in d...
Hackers can access Microsoft Teams chats and emails using access tokens
A recent discovery has revealed that hackers can exploit a flaw in Microsoft Teams on Windows to obtain encrypted authentication tokens , which grant unauthorized access to chats, emails, and files st...
FIA website hacked: personal data of Max Verstappen and over 7,000 drivers exposed
Security researchers have discovered vulnerabilities in an FIA website that contained sensitive personal information and documents relating to drivers, including world champion Max Verstappen. Ian Car...
Featured Articles

In recent days, a select few users have reported having access to the new Gemini 3.0 Pro model. Initial impressions suggest a significant improvement over the previous generation, so much so that many...

On October 27, the Blue Hall Forum on the theme of “Improving Global Governance and Building a Community with a Shared Future for Humanity” was held at the Ministry of Foreign Affairs in B...

Government hackers breached a nuclear weapons component manufacturing facility in the United States by exploiting vulnerabilities in Microsoft SharePoint. The incident affected the Kansas City Nationa...

We’ve often quoted this phrase: “Fighting cybercrime is like pulling weeds: if you don’t completely eradicate them, they’ll grow back, much more vigorous than before,” an...

Over the past few days, some users have received a notification saying that their Gemini Advanced devices have been “upgraded from the previous generation model to the 3.0 Pro, the smartest mode...
Malaysia launches new RM2 billion submarine cable for digital revolution
In-depth analysis! Your toilet now knows you better than your GP.
What you write on ChatGPT is evidence. A user’s identity was revealed in an investigation.
Huawei launches data center AI card: Atlas 300I DUO, dual GPU, 140 TFLOPS
Critical vulnerability in Windows SMB client: CISA raises alarm
Data Anonymization: Protecting Privacy Without Losing Utility

Malaysia launches new RM2 billion submarine cable for digital revolution
Redazione RHC - October 21st, 2025
Malaysia has announced the construction of a new submarine fiber-optic cable system to boost connectivity between the eastern and western parts of the country, aiming to support the growth of...

In-depth analysis! Your toilet now knows you better than your GP.
Redazione RHC - October 21st, 2025
Kohler enters the digital health market with an unusual product: a toilet-mounted module equipped with a camera and a recognition system that monitors health. The device, called Dekoda , costs...

What you write on ChatGPT is evidence. A user’s identity was revealed in an investigation.
Redazione RHC - October 21st, 2025
For the first time, the U.S. Department of Homeland Security has asked OpenAI to disclose the identity of a ChatGPT user whose requests were implicated in a child pornography investigation...

Huawei launches data center AI card: Atlas 300I DUO, dual GPU, 140 TFLOPS
Redazione RHC - October 21st, 2025
On October 19, Gamers Nexus revealed details of the Huawei Atlas 300I DUO , a dual-core AI inference card designed for intelligent computing in data centers. It is a single-slot...

Critical vulnerability in Windows SMB client: CISA raises alarm
Redazione RHC - October 21st, 2025
On October 20, 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent alert regarding a critical vulnerability, CVE-2025-33073, in Microsoft's Windows SMB client. This flaw, characterized by...

Data Anonymization: Protecting Privacy Without Losing Utility
Aniello Giugliano - October 21st, 2025
In an era where personal data is being produced and shared on a massive, daily basis, the concept of anonymization takes on a central role in the debate on privacy...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

