Red Hot Cyber. The Cybersecurity Blog
Featured Articles

A tool has been released that allows for the discreet monitoring of WhatsApp and Signal user activity using just a phone number. The tracking mechanism covers over three billion accounts and allows fo...

MITRE has released its ranking of the 25 most dangerous software vulnerabilities predicted for 2025, based on data collected through the National Vulnerability Database. These vulnerabilities were ide...

The prospect of a four-day workweek, with a resulting three-day long weekend, may not be far off. This is according to Christopher A. Pissarides , a British-Cypriot economist and Nobel Prize winner, w...

The recent 2025.4 release of Kali Linux has been made available to the public, introducing significant improvements to the GNOME, KDE, and Xfce desktop environments . From now on, Wayland will be the ...

An alleged database containing sensitive information on 18 million U.S. citizens over 65 has appeared for sale on a popular dark web forum. The advertiser, who uses the pseudonym “Frenshyny,” clai...
CISA Warns of OpenPLC ScadaBR Vulnerability Exploitation
The Power of A* Algorithm in Artificial Intelligence and Robotics
WhatsApp Messages Contain Hidden GPS Data, Expert Warns
DeepSeekMath-V2 Revolutionizes Math with AI-Powered Proof Verification
Shai-Hulud Attack: npm Supply Chain Compromised Again
ChatGPT to Introduce Targeted Ads, Changing Monetization Strategy

CISA Warns of OpenPLC ScadaBR Vulnerability Exploitation
Redazione RHC - November 29th, 2025
The Cybersecurity and Infrastructure Security Agency (CISA) has expanded its list of exploited vulnerabilities (KEVs), reporting a new vulnerability affecting OpenPLC ScadaBR , due to ongoing active exploitation indications. This...

The Power of A* Algorithm in Artificial Intelligence and Robotics
Redazione RHC - November 29th, 2025
Nearly everything artificial intelligence does today is based on a simple but fundamental idea: any problem can be reduced to finding a path from a starting point to a goal....

WhatsApp Messages Contain Hidden GPS Data, Expert Warns
Redazione RHC - November 29th, 2025
According to computer forensics expert Elom Daniel, WhatsApp messages can contain hidden geolocation data even when the user hasn't intentionally shared their location. He claimed to have received a routine...

DeepSeekMath-V2 Revolutionizes Math with AI-Powered Proof Verification
Redazione RHC - November 29th, 2025
The Chinese company DeepSeek has introduced a new specialized model for solving mathematical problems , DeepSeekMath-V2. This large-scale language model, specifically designed for theorem proving and Olympiad problems, is unique...

Shai-Hulud Attack: npm Supply Chain Compromised Again
Redazione RHC - November 29th, 2025
The npm ecosystem is once again at the center of a large-scale supply chain attack attributed to the Shai-Hulud campaign. This wave has led to the release of hundreds of...

ChatGPT to Introduce Targeted Ads, Changing Monetization Strategy
Redazione RHC - November 28th, 2025
Until now, ChatGPT has been ad-free: no banners, no hidden promotions. Even the paid versions worked without pushy offers. But that could change soon. As reported by user X (formerly...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

