Red Hot Cyber. The Cybersecurity Blog
Trump-Xi Summit: A Truce That Doesn’t Benefit Europe
After years of tensions, tariffs, mutual accusations, and trade wars that have shattered the global balance of power, the long-awaited meeting between Donald Trump and Xi Jinping has finally taken pla...
Cloud yes or Cloud no: When the Digital Sky Darkens
The outage of Microsoft’s cloud services, which occurred just hours before the release of its quarterly results, is just the latest in a long series of outages that are exposing a structural vul...
US builds largest AI supercomputer in history
The U.S. Department of Energy (DOE) has entered into a strategic collaboration with Nvidia and Oracle to build seven next-generation AI-powered supercomputers , set to revolutionize scientific researc...
Microsoft 365 goes down: DNS anomaly paralyzes services worldwide
A DNS service outage was detected by Microsoft on October 29, 2025, impacting access to critical services such as Microsoft Azure and Microsoft 365. An anomaly was detected at 21:37 GMT+5:30, causing ...
Tor Browser Says No to Artificial Intelligence! Security Comes First
Interestingly, while major companies like Microsoft and Google are actively adding AI features to their browsers, the Tor development team has chosen to remove them. @henry, a Tor project contributor,...
Tasting the Exploit: HackerHood tests Microsoft WSUS CVE-2025-59287 Exploit
The cybersecurity landscape was recently rocked by the discovery of a critical Remote Code Execution (RCE) vulnerability in Microsoft’s Windows Server Update Services (WSUS) . Identified as CVE-2025-5...
ChatGPT Atlas: Researchers Discover How a Link Can Lead to Jailbreak
NeuralTrust researchers have discovered a vulnerability in OpenAI’s ChatGPT Atlas browser. This time, the attack vector is linked to the omnibox, the bar where users enter URLs or search queries...
Malware alert: Critical WordPress plugin vulnerabilities actively exploited
Wordfence is raising the alarm about a large-scale malware campaign in which attackers are exploiting critical vulnerabilities in the popular WordPress plugins GutenKit and Hunk Companion . The compan...
Gemini 3.0 Pro: What people who are trying it say
In recent days, a select few users have reported having access to the new Gemini 3.0 Pro model. Initial impressions suggest a significant improvement over the previous generation, so much so that many...
China promotes global AI governance under the United Nations
On October 27, the Blue Hall Forum on the theme of “Improving Global Governance and Building a Community with a Shared Future for Humanity” was held at the Ministry of Foreign Affairs in B...
Featured Articles

After years of tensions, tariffs, mutual accusations, and trade wars that have shattered the global balance of power, the long-awaited meeting between Donald Trump and Xi Jinping has finally taken pla...

The outage of Microsoft’s cloud services, which occurred just hours before the release of its quarterly results, is just the latest in a long series of outages that are exposing a structural vul...

The U.S. Department of Energy (DOE) has entered into a strategic collaboration with Nvidia and Oracle to build seven next-generation AI-powered supercomputers , set to revolutionize scientific researc...

A DNS service outage was detected by Microsoft on October 29, 2025, impacting access to critical services such as Microsoft Azure and Microsoft 365. An anomaly was detected at 21:37 GMT+5:30, causing ...

Interestingly, while major companies like Microsoft and Google are actively adding AI features to their browsers, the Tor development team has chosen to remove them. @henry, a Tor project contributor,...
7-Zip Vulnerable: Symbolic Link Exploit Allows Malicious Code Injection
Salesforce refuses to pay ransom for Scattered Lapsus Hunters attacks
40,000 iPhones stolen and shipped to Asia: London police arrest international gang
Tetris: The game that challenges the limits of modern supercomputers
Oracle E-Business Suite Zero-Day Attack: Clop Exploits CVE-2025-61882
I Want It All! ChatGPT Ready to Become an Operating System

7-Zip Vulnerable: Symbolic Link Exploit Allows Malicious Code Injection
Redazione RHC - October 10th, 2025
Two critical vulnerabilities in the 7-Zip archiver allowed remote code execution when processing ZIP files. The flaws affect how the program handles symbolic links within archives, allowing directory traversal and...

Salesforce refuses to pay ransom for Scattered Lapsus Hunters attacks
Redazione RHC - October 10th, 2025
Salesforce representatives have announced that they have no intention of negotiating or paying a ransom to the attackers responsible for a series of large-scale attacks that resulted in the theft...

40,000 iPhones stolen and shipped to Asia: London police arrest international gang
Redazione RHC - October 10th, 2025
London police announced that Operation Echosteep has uncovered and dismantled a gang responsible for mass iPhone thefts. Investigators estimate the group is responsible for 40% of all phone thefts in...

Tetris: The game that challenges the limits of modern supercomputers
Redazione RHC - October 10th, 2025
First released in 1984 by Russian programmer Alexey Pajitnov , Tetris quickly became a global phenomenon. Born as digital entertainment, the puzzle game has captivated hundreds of millions of people...

Oracle E-Business Suite Zero-Day Attack: Clop Exploits CVE-2025-61882
Redazione RHC - October 10th, 2025
Last week, Oracle warned customers of a critical zero-day vulnerability in its E-Business Suite (CVE-2025-61882), which allows remote execution of arbitrary code without authentication. It has now been revealed that...

I Want It All! ChatGPT Ready to Become an Operating System
Redazione RHC - October 10th, 2025
When Nick Turley joined OpenAI in 2022 to lead the ChatGPT team, he was tasked with transforming enterprise research into a commercial product. He has accomplished this mission remarkably well:...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

