Red Hot Cyber. The Cybersecurity Blog
Featured Articles

In recent months, a new cyber operations infrastructure has been developing in the United States, in which automated agents are becoming not just a support tool, but a full-fledged participant in offe...

The scale of the leak, described by a team from the University of Vienna , demonstrates how dangerous the familiar contact search function of popular messaging apps can be. WhatsApp has always emphasi...

November 18, 2025 – After hours of widespread disruptions , the incident affecting Cloudflare’s global network finally appears to be nearing resolution. The company announced it has implemented a ...

Two serious vulnerabilities in IBM’s AIX operating system could allow remote attackers to execute arbitrary commands on affected systems, prompting the company to issue important security updates. B...

The room is the same: dim lights, chairs in a circle, thermoses of herbal teas now cold from all the talking and venting. We are Shakerati Anonimi , a group of people who never imagined we’d end up ...
BreachForums Resurrects After Yet Another FBI Shutdown
Gemini 3.0 Pro: Google prepares for the generational leap and aims to surpass GPT-5 and Claude 4.5
13,000 times faster than a supercomputer. Google presents Willow, the fastest quantum chip on specific algorithms
Neolix raises $600 million for autonomous driving in urban logistics
Supercomputing power in a refrigerator: the BIE-1 revolution
Critical RCE exploit in Microsoft WSUS actively exploited. CISA warns: imminent risk

BreachForums Resurrects After Yet Another FBI Shutdown
Redazione RHC - October 26th, 2025
We've often quoted this phrase: "Fighting cybercrime is like pulling weeds: if you don't completely eradicate them, they'll grow back, much more vigorous than before," and it's more relevant than...

Gemini 3.0 Pro: Google prepares for the generational leap and aims to surpass GPT-5 and Claude 4.5
Redazione RHC - October 25th, 2025
Over the past few days, some users have received a notification saying that their Gemini Advanced devices have been "upgraded from the previous generation model to the 3.0 Pro, the...

13,000 times faster than a supercomputer. Google presents Willow, the fastest quantum chip on specific algorithms
Redazione RHC - October 25th, 2025
Google's quantum AI team announced a major breakthrough in quantum computing with the unveiling of its new Willow processor, a superconducting chip with 105 qubits that it says can perform...

Neolix raises $600 million for autonomous driving in urban logistics
Redazione RHC - October 25th, 2025
Chinese startup Neolix , specializing in Level 4 autonomous vehicles for urban deliveries, announced on October 23 that it has closed a Series D round of over $600 million ,...

Supercomputing power in a refrigerator: the BIE-1 revolution
Redazione RHC - October 25th, 2025
On October 24, the world's first human-inspired intelligent computing system, the "BI Explorer BIE-1," was officially unveiled at the Guangdong-Macao Deep Cooperation Zone in Hengqin. Zhang Xu, director of the...

Critical RCE exploit in Microsoft WSUS actively exploited. CISA warns: imminent risk
Redazione RHC - October 25th, 2025
A global alert has been issued by the United States Cybersecurity and Infrastructure Security Agency (CISA) regarding the active exploitation of a critical remote code execution (RCE) flaw in Microsoft’s...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

