Red Hot Cyber. The Cybersecurity Blog
Artificial General Intelligence (AGI): the first global standard for measuring it has been defined
On October 21, 2025, an international team of researchers from 29 leading institutions—including Stanford University, MIT, and the University of California, Berkeley —completed a study that marks a mi...
ChatGPT buys me bread! Atlas, the smart browser for macOS, is here.
OpenAI has released the ChatGPT Atlas browser for macOS. It integrates artificial intelligence directly into the interface and can perform tasks on web pages without having to switch between tabs. Atl...
F5 BIG-IP Vulnerability: 266,000 Devices at Risk Worldwide! 2,500 in Italy
The Cybersecurity and Infrastructure Security Agency (CISA) and the Multi-State Information Sharing & Analysis Center (MS-ISAC) are issuing this Joint Cybersecurity Advisory (CSA) in response to t...
The Intel 386 processor turns 40: the 32-bit era began
October 20, 2025, marks a significant anniversary in the history of computing: the Intel 80386 processor, also known as the i386 , celebrates its 40th birthday . And it’s a big birthday! Launche...
Intel releases urgent patches for new Spectre variant
VUSec researchers have presented a paper titled “Training Solo,” which challenges the fundamental principles of protection against Spectre-v2 attacks. Previously , the domain isolation mec...
Famous hackers: Vladimir Levin and the first online bank robbery.
Today we’ll meet another hacker from the past. He’s Vladimir Levin, a Russian hacker from St. Petersburg (Владимир Леонидович Левин), who became famous for breaking into the servers of the...
Cyber Attack on European Airports: Everest Ransomware Claims Claim
On September 20, we reported on a cyberattack that paralyzed several European airports, including Brussels, Berlin, and London Heathrow. This was a supply chain attack that exploited the compromise of...
Inmates hack prison: sentences reduced, funds transferred, and unauthorized visits
The Romanian penitentiary system has found itself at the center of a major digital scandal: inmates in Târgu Jiu hacked the PNA’s internal platform and, for several months, managed data on priso...
WiFi: From Marconi’s Origins to the Wireless Network We Know Today
Today, we live in a world where WiFi is a fundamental necessity, but how did this technology, now taken for granted, come about? How did it then develop into the network we now use every day? In this ...
Operation SIMCARTEL: 1,200 SIM boxes and 40,000 SIM cards stopped by Europol
On October 10, 2025, Latvian authorities conducted a day of action that resulted in the arrest of five Latvian citizens suspected of running a large-scale cyber fraud network. The operation, dubbed SI...
Featured Articles

On October 21, 2025, an international team of researchers from 29 leading institutions—including Stanford University, MIT, and the University of California, Berkeley —completed a study that marks ...

OpenAI has released the ChatGPT Atlas browser for macOS. It integrates artificial intelligence directly into the interface and can perform tasks on web pages without having to switch between tabs. Atl...

The Cybersecurity and Infrastructure Security Agency (CISA) and the Multi-State Information Sharing & Analysis Center (MS-ISAC) are issuing this Joint Cybersecurity Advisory (CSA) in response to t...

October 20, 2025, marks a significant anniversary in the history of computing: the Intel 80386 processor, also known as the i386 , celebrates its 40th birthday . And it’s a big birthday! Launche...

VUSec researchers have presented a paper titled “Training Solo,” which challenges the fundamental principles of protection against Spectre-v2 attacks. Previously , the domain isolation mec...
The freebie party is over! Open source infrastructure is at risk and needs funding.
Zero-Day Vulnerabilities Found in Cisco IOS and IOS XE: Urgent Updates
Artificial Intelligence: A Double-Edged Sword in Digital Security
Kali Linux 2025.3 is out! A new release with improvements and new tools.
CrowdStrike: Cybersecurity Enters the Age of AI Agents
Critical bug in Salesforce CLI: Arbitrary code execution and SYSTEM access

The freebie party is over! Open source infrastructure is at risk and needs funding.
Redazione RHC - September 25th, 2025
An open letter signed by major open source foundations has raised the alarm about the future of the infrastructure that supports modern software development. The Open Source Security Foundation (OpenSSF),...

Zero-Day Vulnerabilities Found in Cisco IOS and IOS XE: Urgent Updates
Redazione RHC - September 25th, 2025
Cisco has disclosed a zero-day vulnerability, tracked as CVE-2025-20352, in its widely used IOS and IOS XE software; this vulnerability appears to be actively exploited. This vulnerability was initially identified...

Artificial Intelligence: A Double-Edged Sword in Digital Security
Redazione RHC - September 25th, 2025
Artificial intelligence is increasingly being described as a double-edged sword, capable of offering enormous advantages but also opening new avenues for digital crime. During the " TRUST AICS - 2025"...

Kali Linux 2025.3 is out! A new release with improvements and new tools.
Redazione RHC - September 24th, 2025
Kali Linux developers have released a new release, 2025.3 , which expands the distribution's functionality and adds ten new penetration testing tools. The update improves deployment processes in virtual environments,...

CrowdStrike: Cybersecurity Enters the Age of AI Agents
Marcello Filacchioni - September 24th, 2025
At Fal.Con 2025, the annual conference that brings together thousands of cybersecurity experts from around the world, CrowdStrike made one thing clear: cyber defense is entering a new era, that...

Critical bug in Salesforce CLI: Arbitrary code execution and SYSTEM access
Redazione RHC - September 24th, 2025
A critical vulnerability in the Salesforce CLI installer (sf-x64.exe) allows attackers to gain arbitrary code execution, privilege escalation, and SYSTEM-level access on Windows systems. The vulnerability exploits the way the...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

