Red Hot Cyber. The Cybersecurity Blog
Critical RCE exploit in Microsoft WSUS actively exploited. CISA warns: imminent risk
A global alert has been issued by the United States Cybersecurity and Infrastructure Security Agency (CISA) regarding the active exploitation of a critical remote code execution (RCE) flaw in Microsof...
No flesh, no bones, just code! Channel 4’s first AI presenter arrives.
On Monday 20 October, Channel 4 broadcast a full-length documentary hosted by a creative TV presenter powered entirely by artificial intelligence. ” I’m not real. For the first time on a B...
Russia and Cybercrime: A Balance Between Selective Repression and State Interest
The Russian cybercrime ecosystem has entered a phase of profound transformation, triggered by a combination of factors: unprecedented international pressure from law enforcement agencies, a shift in d...
Hackers can access Microsoft Teams chats and emails using access tokens
A recent discovery has revealed that hackers can exploit a flaw in Microsoft Teams on Windows to obtain encrypted authentication tokens , which grant unauthorized access to chats, emails, and files st...
FIA website hacked: personal data of Max Verstappen and over 7,000 drivers exposed
Security researchers have discovered vulnerabilities in an FIA website that contained sensitive personal information and documents relating to drivers, including world champion Max Verstappen. Ian Car...
Artificial General Intelligence (AGI): the first global standard for measuring it has been defined
On October 21, 2025, an international team of researchers from 29 leading institutions—including Stanford University, MIT, and the University of California, Berkeley —completed a study that marks a mi...
ChatGPT buys me bread! Atlas, the smart browser for macOS, is here.
OpenAI has released the ChatGPT Atlas browser for macOS. It integrates artificial intelligence directly into the interface and can perform tasks on web pages without having to switch between tabs. Atl...
F5 BIG-IP Vulnerability: 266,000 Devices at Risk Worldwide! 2,500 in Italy
The Cybersecurity and Infrastructure Security Agency (CISA) and the Multi-State Information Sharing & Analysis Center (MS-ISAC) are issuing this Joint Cybersecurity Advisory (CSA) in response to t...
The Intel 386 processor turns 40: the 32-bit era began
October 20, 2025, marks a significant anniversary in the history of computing: the Intel 80386 processor, also known as the i386 , celebrates its 40th birthday . And it’s a big birthday! Launche...
Intel releases urgent patches for new Spectre variant
VUSec researchers have presented a paper titled “Training Solo,” which challenges the fundamental principles of protection against Spectre-v2 attacks. Previously , the domain isolation mec...
Featured Articles

A global alert has been issued by the United States Cybersecurity and Infrastructure Security Agency (CISA) regarding the active exploitation of a critical remote code execution (RCE) flaw in Microsof...

On Monday 20 October, Channel 4 broadcast a full-length documentary hosted by a creative TV presenter powered entirely by artificial intelligence. ” I’m not real. For the first time on a B...

The Russian cybercrime ecosystem has entered a phase of profound transformation, triggered by a combination of factors: unprecedented international pressure from law enforcement agencies, a shift in d...

A recent discovery has revealed that hackers can exploit a flaw in Microsoft Teams on Windows to obtain encrypted authentication tokens , which grant unauthorized access to chats, emails, and files st...

Security researchers have discovered vulnerabilities in an FIA website that contained sensitive personal information and documents relating to drivers, including world champion Max Verstappen. Ian Car...
100 bug researchers, $32 million! HackerOne: AI bugs are on the rise!
Beyond the Screen: The Postal Police Event for a Healthy Life Beyond Social Media
They’re offering you €55,000 for access to your office account. What should you do?
Telegram opens an artificial intelligence lab in Kazakhstan
CISA Alert: Sudo Bug Affects Linux and Unix! Urgent Action Required by October 20th
Work and artificial intelligence: rising salaries for those who use AI?

100 bug researchers, $32 million! HackerOne: AI bugs are on the rise!
Redazione RHC - October 3rd, 2025
Vulnerability bounty platform HackerOne reported that white hat hackers worldwide received $81 million in compensation over the past 12 months. According to the company, this represents a 13% increase over...

Beyond the Screen: The Postal Police Event for a Healthy Life Beyond Social Media
Marcello Filacchioni - October 3rd, 2025
The Red Hot Cyber Community had the opportunity to participate in "Beyond the Screen," the Postal Police's important initiative for young people on October 2nd , with the aim of...

They’re offering you €55,000 for access to your office account. What should you do?
Redazione RHC - October 3rd, 2025
BBC journalist Joe Tidy found himself in a situation usually hidden in the shadows of cybercrime. In July, he received an unexpected message on the messaging app Signal from an...

Telegram opens an artificial intelligence lab in Kazakhstan
Redazione RHC - October 3rd, 2025
Telegram founder Pavel Durov announced the opening of a new artificial intelligence lab in Kazakhstan . The announcement was made in Astana during the Digital Bridge 2025 international forum. The...

CISA Alert: Sudo Bug Affects Linux and Unix! Urgent Action Required by October 20th
Redazione RHC - October 3rd, 2025
The Cyberspace and Infrastructure Security Center (CISA) recently added the critical vulnerability in the Sudo utility to its Actively Exploited Vulnerabilities (KEV) list. This effectively prompts government agencies to take...

Work and artificial intelligence: rising salaries for those who use AI?
Redazione RHC - October 3rd, 2025
The debate over artificial intelligence applied to the world of work is currently intensifying, a clear sign of how digital technology is radically transforming employment methods, skills, and dynamics. The...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

