Red Hot Cyber. The Cybersecurity Blog
Featured Articles

November 9th marked the 21st anniversary of Firefox 1.0. In 2004, it was the first stable release of Mozilla’s new browser, which quickly positioned itself as a simple and secure alternative to ...

Researchers discovered several libraries in the public NuGet registry containing code that will be activated in 2027 and 2028. The infected packages target three popular .NET data storage engines (Mic...

Only the flag changes, but the result is always the same. In 2017, WikiLeaks published Vault7 , a leak that exposed the CIA’s arsenal: toolkits for penetrating smartphones, smart TVs, and operat...

Microsoft has announced a new side-channel attack on remote language models. It allows a passive attacker, capable of viewing encrypted network traffic, to use artificial intelligence to determine the...

Imagine a futuristic city split in half: on one side, glittering towers of innovation; on the other, chaos and the shadows of lost control. This isn’t a dystopian vision, but rather the landscap...
No flesh, no bones, just code! Channel 4’s first AI presenter arrives.
DC Comics takes a stand: “No generative AI”
$792,750 in one day! 56 zerodays detected at Pwn2Own Ireland 2025
A “hacked” water system: hacktivism becomes digital propaganda
Russia and Cybercrime: A Balance Between Selective Repression and State Interest
Hackers can access Microsoft Teams chats and emails using access tokens

No flesh, no bones, just code! Channel 4’s first AI presenter arrives.
Redazione RHC - October 24th, 2025
On Monday 20 October, Channel 4 broadcast a full-length documentary hosted by a creative TV presenter powered entirely by artificial intelligence. " I'm not real. For the first time on...

DC Comics takes a stand: “No generative AI”
Redazione RHC - October 24th, 2025
DC Comics has definitively stated its position on generative AI: no machine involvement in the storytelling or illustrations . The announcement was made by company president Jim Lee during a...

$792,750 in one day! 56 zerodays detected at Pwn2Own Ireland 2025
Redazione RHC - October 24th, 2025
On the second day of the Pwn2Own Ireland 2025 competition, participants achieved impressive success, discovering 56 new zero-day vulnerabilities and earning a total of $792,750. This is the second phase...

A “hacked” water system: hacktivism becomes digital propaganda
Redazione RHC - October 24th, 2025
In September, Forescout specialists detected a targeted attack on their honeypot server, which mimicked the control system of a water treatment plant. A new hacktivist group, TwoNet , operating in...

Russia and Cybercrime: A Balance Between Selective Repression and State Interest
Ada Spinelli - October 24th, 2025
The Russian cybercrime ecosystem has entered a phase of profound transformation, triggered by a combination of factors: unprecedented international pressure from law enforcement agencies, a shift in domestic priorities, and...

Hackers can access Microsoft Teams chats and emails using access tokens
Redazione RHC - October 24th, 2025
A recent discovery has revealed that hackers can exploit a flaw in Microsoft Teams on Windows to obtain encrypted authentication tokens , which grant unauthorized access to chats, emails, and...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

