Red Hot Cyber. The Cybersecurity Blog
No flesh, no bones, just code! Channel 4’s first AI presenter arrives.
On Monday 20 October, Channel 4 broadcast a full-length documentary hosted by a creative TV presenter powered entirely by artificial intelligence. ” I’m not real. For the first time on a B...
Russia and Cybercrime: A Balance Between Selective Repression and State Interest
The Russian cybercrime ecosystem has entered a phase of profound transformation, triggered by a combination of factors: unprecedented international pressure from law enforcement agencies, a shift in d...
Hackers can access Microsoft Teams chats and emails using access tokens
A recent discovery has revealed that hackers can exploit a flaw in Microsoft Teams on Windows to obtain encrypted authentication tokens , which grant unauthorized access to chats, emails, and files st...
FIA website hacked: personal data of Max Verstappen and over 7,000 drivers exposed
Security researchers have discovered vulnerabilities in an FIA website that contained sensitive personal information and documents relating to drivers, including world champion Max Verstappen. Ian Car...
Artificial General Intelligence (AGI): the first global standard for measuring it has been defined
On October 21, 2025, an international team of researchers from 29 leading institutions—including Stanford University, MIT, and the University of California, Berkeley —completed a study that marks a mi...
ChatGPT buys me bread! Atlas, the smart browser for macOS, is here.
OpenAI has released the ChatGPT Atlas browser for macOS. It integrates artificial intelligence directly into the interface and can perform tasks on web pages without having to switch between tabs. Atl...
F5 BIG-IP Vulnerability: 266,000 Devices at Risk Worldwide! 2,500 in Italy
The Cybersecurity and Infrastructure Security Agency (CISA) and the Multi-State Information Sharing & Analysis Center (MS-ISAC) are issuing this Joint Cybersecurity Advisory (CSA) in response to t...
The Intel 386 processor turns 40: the 32-bit era began
October 20, 2025, marks a significant anniversary in the history of computing: the Intel 80386 processor, also known as the i386 , celebrates its 40th birthday . And it’s a big birthday! Launche...
Intel releases urgent patches for new Spectre variant
VUSec researchers have presented a paper titled “Training Solo,” which challenges the fundamental principles of protection against Spectre-v2 attacks. Previously , the domain isolation mec...
Famous hackers: Vladimir Levin and the first online bank robbery.
Today we’ll meet another hacker from the past. He’s Vladimir Levin, a Russian hacker from St. Petersburg (Владимир Леонидович Левин), who became famous for breaking into the servers of the...
Featured Articles

On Monday 20 October, Channel 4 broadcast a full-length documentary hosted by a creative TV presenter powered entirely by artificial intelligence. ” I’m not real. For the first time on a B...

The Russian cybercrime ecosystem has entered a phase of profound transformation, triggered by a combination of factors: unprecedented international pressure from law enforcement agencies, a shift in d...

A recent discovery has revealed that hackers can exploit a flaw in Microsoft Teams on Windows to obtain encrypted authentication tokens , which grant unauthorized access to chats, emails, and files st...

Security researchers have discovered vulnerabilities in an FIA website that contained sensitive personal information and documents relating to drivers, including world champion Max Verstappen. Ian Car...

On October 21, 2025, an international team of researchers from 29 leading institutions—including Stanford University, MIT, and the University of California, Berkeley —completed a study that marks ...
Nvidia, Microsoft, and xAI join forces to acquire Aligned Data Centers for $40 billion
From online fraud to organ trafficking. South Korea repatriates citizens from Cambodia.
Bus becomes travelling museum of retro computers in UK
A computer science degree is no longer a guarantee of employment. AI is stealing jobs (and interviews).
The era of one-handed supercomputers is upon us! GIGABYTE ATOM: A petaflop and 128GB of AI storage.
100 years of Italian Intelligence! Mattarella celebrates the SIM’s centenary at the Quirinale Palace

Nvidia, Microsoft, and xAI join forces to acquire Aligned Data Centers for $40 billion
Redazione RHC - October 17th, 2025
A consortium of Nvidia, Microsoft, BlackRock and xAI , the company founded by Elon Musk , announced on Wednesday an agreement to acquire Aligned Data Centers for a total value...

From online fraud to organ trafficking. South Korea repatriates citizens from Cambodia.
Redazione RHC - October 17th, 2025
South Korea has launched a repatriation operation for its citizens from Cambodia, following reports of kidnappings, violence and the death of a 22-year-old student who was the victim of a...

Bus becomes travelling museum of retro computers in UK
Redazione RHC - October 16th, 2025
In the UK, father and son Jason and Luke Stoner have transformed an old school bus into a traveling museum dedicated to retro computers and game consoles. The inspiration came...

A computer science degree is no longer a guarantee of employment. AI is stealing jobs (and interviews).
Redazione RHC - October 16th, 2025
Once upon a time, a degree in computer science was a guarantee of success. Competitive salaries, generous benefits, and immediate employment opportunities were the norm. Today, however, for many young...

The era of one-handed supercomputers is upon us! GIGABYTE ATOM: A petaflop and 128GB of AI storage.
Redazione RHC - October 16th, 2025
On October 15, in addition to the much-vaunted NVIDIA DGX Spark solution, created in collaboration between NVIDIA and Mediatek, another mini AI accelerator made its debut to the world: the...

100 years of Italian Intelligence! Mattarella celebrates the SIM’s centenary at the Quirinale Palace
Redazione RHC - October 16th, 2025
October 15, 2025 marks an anniversary of exceptional importance in the history of Italian national security: one hundred years since the birth of the Military Information Service (SIM) , the...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

