Red Hot Cyber. The Cybersecurity Blog
BreachForums Resurrects After Yet Another FBI Shutdown
We’ve often quoted this phrase: “Fighting cybercrime is like pulling weeds: if you don’t completely eradicate them, they’ll grow back, much more vigorous than before,” an...
Gemini 3.0 Pro: Google prepares for the generational leap and aims to surpass GPT-5 and Claude 4.5
Over the past few days, some users have received a notification saying that their Gemini Advanced devices have been “upgraded from the previous generation model to the 3.0 Pro, the smartest mode...
Critical RCE exploit in Microsoft WSUS actively exploited. CISA warns: imminent risk
A global alert has been issued by the United States Cybersecurity and Infrastructure Security Agency (CISA) regarding the active exploitation of a critical remote code execution (RCE) flaw in Microsof...
No flesh, no bones, just code! Channel 4’s first AI presenter arrives.
On Monday 20 October, Channel 4 broadcast a full-length documentary hosted by a creative TV presenter powered entirely by artificial intelligence. ” I’m not real. For the first time on a B...
Russia and Cybercrime: A Balance Between Selective Repression and State Interest
The Russian cybercrime ecosystem has entered a phase of profound transformation, triggered by a combination of factors: unprecedented international pressure from law enforcement agencies, a shift in d...
Hackers can access Microsoft Teams chats and emails using access tokens
A recent discovery has revealed that hackers can exploit a flaw in Microsoft Teams on Windows to obtain encrypted authentication tokens , which grant unauthorized access to chats, emails, and files st...
FIA website hacked: personal data of Max Verstappen and over 7,000 drivers exposed
Security researchers have discovered vulnerabilities in an FIA website that contained sensitive personal information and documents relating to drivers, including world champion Max Verstappen. Ian Car...
Artificial General Intelligence (AGI): the first global standard for measuring it has been defined
On October 21, 2025, an international team of researchers from 29 leading institutions—including Stanford University, MIT, and the University of California, Berkeley —completed a study that marks a mi...
ChatGPT buys me bread! Atlas, the smart browser for macOS, is here.
OpenAI has released the ChatGPT Atlas browser for macOS. It integrates artificial intelligence directly into the interface and can perform tasks on web pages without having to switch between tabs. Atl...
F5 BIG-IP Vulnerability: 266,000 Devices at Risk Worldwide! 2,500 in Italy
The Cybersecurity and Infrastructure Security Agency (CISA) and the Multi-State Information Sharing & Analysis Center (MS-ISAC) are issuing this Joint Cybersecurity Advisory (CSA) in response to t...
Featured Articles

We’ve often quoted this phrase: “Fighting cybercrime is like pulling weeds: if you don’t completely eradicate them, they’ll grow back, much more vigorous than before,” an...

Over the past few days, some users have received a notification saying that their Gemini Advanced devices have been “upgraded from the previous generation model to the 3.0 Pro, the smartest mode...

A global alert has been issued by the United States Cybersecurity and Infrastructure Security Agency (CISA) regarding the active exploitation of a critical remote code execution (RCE) flaw in Microsof...

On Monday 20 October, Channel 4 broadcast a full-length documentary hosted by a creative TV presenter powered entirely by artificial intelligence. ” I’m not real. For the first time on a B...

The Russian cybercrime ecosystem has entered a phase of profound transformation, triggered by a combination of factors: unprecedented international pressure from law enforcement agencies, a shift in d...
Wave of attacks against Palo Alto Networks: Over 2,200 IPs involved in the new campaign
Qualcomm Acquires Arduino to Strengthen Presence in IoT and Robotics
North Korean hackers steal $2 billion in cryptocurrency in nine months of fraud
Scattered Lapsus$ Hunters: “We’re paying those who bombard corporate executives with emails.”
Redox OS introduces multithreading by default and improves performance.
Feed Wars: Pro-Israel PsyOps Land on TikTok and ChatGPT

Wave of attacks against Palo Alto Networks: Over 2,200 IPs involved in the new campaign
Redazione RHC - October 8th, 2025
Beginning on October 7, 2025, there was a large-scale intensification of targeted attacks against Palo Alto Networks' GlobalProtect access portals, PAN-OS . Over 2,200 unique IP addresses were targeted in...

Qualcomm Acquires Arduino to Strengthen Presence in IoT and Robotics
Redazione RHC - October 8th, 2025
Qualcomm announced on Tuesday the acquisition of Arduino , an Italian company known for producing low-cost programmable printed circuit boards. The company, which will become an independent subsidiary of the...

North Korean hackers steal $2 billion in cryptocurrency in nine months of fraud
Redazione RHC - October 8th, 2025
A North Korean-linked hacking network stole over $2 billion in cryptocurrency in the first nine months of 2025. Elliptic analysts call this the largest amount ever recorded, with three months...

Scattered Lapsus$ Hunters: “We’re paying those who bombard corporate executives with emails.”
Redazione RHC - October 8th, 2025
Renewing their strategy, the Scattered Lapsus$ Hunters group has returned to the forefront with a new and surprising tactic to put pressure on victims. Cybercriminals have promised a $10 cryptocurrency...

Redox OS introduces multithreading by default and improves performance.
Redazione RHC - October 8th, 2025
The developers of the Redox OS operating system, written in Rust, have enabled multithreading support by default for x86 systems. Previously, the feature was experimental, but after some bug fixes,...

Feed Wars: Pro-Israel PsyOps Land on TikTok and ChatGPT
Redazione RHC - October 8th, 2025
The Israeli government has awarded the American company Clock Tower X LLC a $6 million contract to conduct a large-scale media campaign in the United States, Nick Cleveland-Stout reports on...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

