Red Hot Cyber. The Cybersecurity Blog
Critical RCE exploit in Microsoft WSUS actively exploited. CISA warns: imminent risk
A global alert has been issued by the United States Cybersecurity and Infrastructure Security Agency (CISA) regarding the active exploitation of a critical remote code execution (RCE) flaw in Microsof...
No flesh, no bones, just code! Channel 4’s first AI presenter arrives.
On Monday 20 October, Channel 4 broadcast a full-length documentary hosted by a creative TV presenter powered entirely by artificial intelligence. ” I’m not real. For the first time on a B...
Russia and Cybercrime: A Balance Between Selective Repression and State Interest
The Russian cybercrime ecosystem has entered a phase of profound transformation, triggered by a combination of factors: unprecedented international pressure from law enforcement agencies, a shift in d...
Hackers can access Microsoft Teams chats and emails using access tokens
A recent discovery has revealed that hackers can exploit a flaw in Microsoft Teams on Windows to obtain encrypted authentication tokens , which grant unauthorized access to chats, emails, and files st...
FIA website hacked: personal data of Max Verstappen and over 7,000 drivers exposed
Security researchers have discovered vulnerabilities in an FIA website that contained sensitive personal information and documents relating to drivers, including world champion Max Verstappen. Ian Car...
Artificial General Intelligence (AGI): the first global standard for measuring it has been defined
On October 21, 2025, an international team of researchers from 29 leading institutions—including Stanford University, MIT, and the University of California, Berkeley —completed a study that marks a mi...
ChatGPT buys me bread! Atlas, the smart browser for macOS, is here.
OpenAI has released the ChatGPT Atlas browser for macOS. It integrates artificial intelligence directly into the interface and can perform tasks on web pages without having to switch between tabs. Atl...
F5 BIG-IP Vulnerability: 266,000 Devices at Risk Worldwide! 2,500 in Italy
The Cybersecurity and Infrastructure Security Agency (CISA) and the Multi-State Information Sharing & Analysis Center (MS-ISAC) are issuing this Joint Cybersecurity Advisory (CSA) in response to t...
The Intel 386 processor turns 40: the 32-bit era began
October 20, 2025, marks a significant anniversary in the history of computing: the Intel 80386 processor, also known as the i386 , celebrates its 40th birthday . And it’s a big birthday! Launche...
Intel releases urgent patches for new Spectre variant
VUSec researchers have presented a paper titled “Training Solo,” which challenges the fundamental principles of protection against Spectre-v2 attacks. Previously , the domain isolation mec...
Featured Articles

A global alert has been issued by the United States Cybersecurity and Infrastructure Security Agency (CISA) regarding the active exploitation of a critical remote code execution (RCE) flaw in Microsof...

On Monday 20 October, Channel 4 broadcast a full-length documentary hosted by a creative TV presenter powered entirely by artificial intelligence. ” I’m not real. For the first time on a B...

The Russian cybercrime ecosystem has entered a phase of profound transformation, triggered by a combination of factors: unprecedented international pressure from law enforcement agencies, a shift in d...

A recent discovery has revealed that hackers can exploit a flaw in Microsoft Teams on Windows to obtain encrypted authentication tokens , which grant unauthorized access to chats, emails, and files st...

Security researchers have discovered vulnerabilities in an FIA website that contained sensitive personal information and documents relating to drivers, including world champion Max Verstappen. Ian Car...
And the drones are going to hell! The anti-drone technology developed by the USA
Microsoft goes all out with shoes! They’ve launched collectible Windows XP-themed Crocs
The future of submarine cables: 48% longer by 2040. Are we really ready?
Klopatra Arrives! The Banking Trojan That Threatens Android Users
Data Act: Yet another regulation? Yes. But this one really changes the game (even for those in security).
Google Drive defends itself from ransomware! AI blocks attacks

And the drones are going to hell! The anti-drone technology developed by the USA
Redazione RHC - October 3rd, 2025
The American company Epirus has provided an impressive demonstration of its Leonidas microwave defense system, designed to combat drones. At the Camp Atterbury test site in Indiana, the system was...

Microsoft goes all out with shoes! They’ve launched collectible Windows XP-themed Crocs
Redazione RHC - October 2nd, 2025
This year, Microsoft celebrates its first 50 years, a milestone that reflects the company's transformation from a small startup in 1975 to a global technology giant. Founded by Bill Gates...

The future of submarine cables: 48% longer by 2040. Are we really ready?
Redazione RHC - October 2nd, 2025
The undersea cables connecting the UK to the outside world are vital to the country, with transactions amounting to £220 billion every day. The Joint Committee on National Security Strategy...

Klopatra Arrives! The Banking Trojan That Threatens Android Users
Redazione RHC - October 2nd, 2025
An Android banking Trojan and RAT called Klopatra masquerades as an IPTV and VPN app and has already infected over 3,000 devices . The malware is a Trojan capable of...

Data Act: Yet another regulation? Yes. But this one really changes the game (even for those in security).
Sandro Sana - October 2nd, 2025
Every time Brussels churns out a new acronym, someone in the company snorts: "More paper?" It happens. But the Data Act isn't just a stamp to add to the binder:...

Google Drive defends itself from ransomware! AI blocks attacks
Redazione RHC - October 2nd, 2025
Google has unveiled a new AI tool for Drive for desktop. The model is said to have been trained on millions of real-world ransomware samples and can suspend syncing to...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

