Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Apple is going through a period of major leadership changes , with the departure of key figures who have contributed significantly to the company’s technological development. The latest executive to...

Cloudflare experienced a significant outage on the morning of December 5, 2025, when at 8:47 a.m. UTC, a portion of its infrastructure began experiencing internal errors. The incident, which lasted ap...

A critical vulnerability has been published in Apache Tika that could allow an XML external entity injection attack, known as XXE . The vulnerability, classified as CVE-2025-66516, has a CVE severity ...

A spokesperson for the Chinese Embassy in Canada responded to a reporter’s question about the outcry in Canada over so-called “Chinese cyber attacks.” A reporter asked : Recently, the Canadian C...

Starting July 1, 2026, Microsoft 365 and Office 365 subscription prices for business and government customers will increase by 8% to 33% , depending on the plan. This price adjustment will apply to bo...
Vault7 with a Chinese twist: China’s secret global surveillance system exposed
Whisper Leak: The New Side-Channel Attack That Steals Messages with LLMs
QNAP fixes 7 critical NAS bugs discovered at Pwn2Own Ireland 2025
Artificial intelligence surpasses humans, but not in every field. Is AGI near or far away?
Techno-optimism vs. the power of control: are we the greatest threat from AI?
Google Gemini 3.0: New features and updates for the year’s most anticipated AI assistant

Vault7 with a Chinese twist: China’s secret global surveillance system exposed
Redazione RHC - November 9th, 2025
Only the flag changes, but the result is always the same. In 2017, WikiLeaks published Vault7 , a leak that exposed the CIA's arsenal: toolkits for penetrating smartphones, smart TVs,...

Whisper Leak: The New Side-Channel Attack That Steals Messages with LLMs
Redazione RHC - November 9th, 2025
Microsoft has announced a new side-channel attack on remote language models. It allows a passive attacker, capable of viewing encrypted network traffic, to use artificial intelligence to determine the topic...

QNAP fixes 7 critical NAS bugs discovered at Pwn2Own Ireland 2025
Redazione RHC - November 9th, 2025
QNAP has fixed seven critical zero-day vulnerabilities in its Network Attached Storage (NAS) operating systems after a group of researchers successfully exploited them at Pwn2Own Ireland 2025 , held in...

Artificial intelligence surpasses humans, but not in every field. Is AGI near or far away?
Redazione RHC - November 9th, 2025
According to experts, humanity has entered a new stage in the development of artificial intelligence: an era in which systems no longer simply assist humans , but are able to...

Techno-optimism vs. the power of control: are we the greatest threat from AI?
Olivia Terragni - November 8th, 2025
Imagine a futuristic city split in half: on one side, glittering towers of innovation; on the other, chaos and the shadows of lost control. This isn't a dystopian vision, but...

Google Gemini 3.0: New features and updates for the year’s most anticipated AI assistant
Redazione RHC - November 8th, 2025
Over the past week, Google announced that the Gemini Assistant can now natively integrate YouTube and Google Maps services without the need to use specific commands like "@YouTube" or "@Google...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

