Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Gartner analysts have urged businesses to temporarily stop using browsers with built-in artificial intelligence (AI) capabilities . In a recent advisory, the company emphasizes that such tools pose un...

A critical vulnerability affecting the FortiOS, FortiWeb, FortiProxy , and FortiSwitchManager product lines has been reported by Fortinet via an urgent security advisory. This advisory was issued in c...

It seems the White House isn’t entirely clear … at least judging by yet another change of heart regarding the sale of Nvidia’s advanced chips to China, with the Trump administration having decid...

According to a recently released report by the Financial Crimes Enforcement Network (FinCEN) , global ransomware activity peaked in 2023, only to plummet in 2024. This decline is attributed to success...

Despite significant geopolitical challenges, the mercenary spyware industry remains a resilient and persistent threat; in this context, the well-known vendor Intellexa continues to expand its arsenal....
The Power of A* Algorithm in Artificial Intelligence and Robotics
WhatsApp Messages Contain Hidden GPS Data, Expert Warns
DeepSeekMath-V2 Revolutionizes Math with AI-Powered Proof Verification
Shai-Hulud Attack: npm Supply Chain Compromised Again
ChatGPT to Introduce Targeted Ads, Changing Monetization Strategy
GitLab Security Updates Fix High-Severity Vulnerabilities CVE-2024-9183

The Power of A* Algorithm in Artificial Intelligence and Robotics
Redazione RHC - November 29th, 2025
Nearly everything artificial intelligence does today is based on a simple but fundamental idea: any problem can be reduced to finding a path from a starting point to a goal....

WhatsApp Messages Contain Hidden GPS Data, Expert Warns
Redazione RHC - November 29th, 2025
According to computer forensics expert Elom Daniel, WhatsApp messages can contain hidden geolocation data even when the user hasn't intentionally shared their location. He claimed to have received a routine...

DeepSeekMath-V2 Revolutionizes Math with AI-Powered Proof Verification
Redazione RHC - November 29th, 2025
The Chinese company DeepSeek has introduced a new specialized model for solving mathematical problems , DeepSeekMath-V2. This large-scale language model, specifically designed for theorem proving and Olympiad problems, is unique...

Shai-Hulud Attack: npm Supply Chain Compromised Again
Redazione RHC - November 29th, 2025
The npm ecosystem is once again at the center of a large-scale supply chain attack attributed to the Shai-Hulud campaign. This wave has led to the release of hundreds of...

ChatGPT to Introduce Targeted Ads, Changing Monetization Strategy
Redazione RHC - November 28th, 2025
Until now, ChatGPT has been ad-free: no banners, no hidden promotions. Even the paid versions worked without pushy offers. But that could change soon. As reported by user X (formerly...

GitLab Security Updates Fix High-Severity Vulnerabilities CVE-2024-9183
Redazione RHC - November 28th, 2025
GitLab has released critical security updates for its Community Edition (CE) and Enterprise Edition (EE) to address several high-severity vulnerabilities . The newly released patches 18.6.1, 18.5.3, and 18.4.5 address...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

