Red Hot Cyber. The Cybersecurity Blog
Featured Articles

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

Anthropic has released Claude Opus 4.5 , its new flagship model, which the company says is the most powerful version yet and ranks at the top of the class for practical programming, agent-based produc...

On November 24, Alibaba announced Qwen3Max, which had been in public beta for a week , and had already surpassed 10 million downloads. It was a record that shattered all others. In a very short time, ...

Remote work has given employees freedom , but with it has also come digital surveillance . We discussed this some time ago in an article, reporting that these monitoring tools are also coming to Micro...

On November 13, Eurofiber France, a respected provider of fiber optic network and VPN solutions to many of France’s leading companies, discovered that its systems had been compromised by criminal ha...
Port scanning in 2025: Nmap and AI — how to integrate them securely and operationally
The Louvre Theft: When Thieves Taught the World the Physical Pen Test
Starting November 12th, age verification for porn sites will be implemented in Italy. What’s changing?
AzureHound: The “Legitimate” Tool for Cloud Attacks
Red Hot Cyber launches free real-time CVE Enrichment service
Going 50 Years Without Charging Your Phone: Here’s the Chinese Battery That Will Change Everything

Port scanning in 2025: Nmap and AI — how to integrate them securely and operationally
Luca Stivali - November 1st, 2025
In 2025, port scanning remains a key activity for both Red Teams (reconnaissance, discovery, fingerprinting) and Blue Teams (monitoring and proactive defense). But the latest development is the arrival of...

The Louvre Theft: When Thieves Taught the World the Physical Pen Test
Luca Errico - November 1st, 2025
The event that shook the world on October 19, 2025, was not a natural disaster or a financial collapse, but the sensational theft of Napoleon's jewels from the Louvre Museum....

Starting November 12th, age verification for porn sites will be implemented in Italy. What’s changing?
Redazione RHC - October 31st, 2025
Starting Tuesday, November 12, 2025, new provisions from the Italian Communications Regulatory Authority (AGCOM) will come into force, requiring an age verification system for accessing pornographic websites. The measure, provided...

AzureHound: The “Legitimate” Tool for Cloud Attacks
Luca Galuppi - October 31st, 2025
AzureHound, part of the BloodHound suite, was born as an open-source tool to help security teams and red teams identify vulnerabilities and escalation paths in Microsoft Azure and Entra ID...

Red Hot Cyber launches free real-time CVE Enrichment service
Redazione RHC - October 31st, 2025
Timeliness is key in cybersecurity. Red Hot Cyber recently launched a completely free service that allows IT professionals, security analysts, and enthusiasts to monitor the most critical vulnerabilities published in...

Going 50 Years Without Charging Your Phone: Here’s the Chinese Battery That Will Change Everything
Redazione RHC - October 31st, 2025
Beijing-based Betavolt claims to have developed a nuclear battery that represents the world's first achievement in the miniaturization of atomic energy. This innovation involves integrating 63 nuclear isotopes into a...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

