Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Enterprise BusinessLog 320x200 1
Redhotcyber Banner Sito 970x120px Uscita 101125

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Nuclear power entirely in the hands of AI! And what if there’s an accident?
Di Redazione RHC - 17/11/2025

In the technological field, the idea that the future development of generating systems depends inexorably on the expansion of nuclear capacity is taking root, pushing the sector’s players to identif...

Immagine del sito
Tor Browser 15.0.1: Critical Vulnerability Fixes and Improvements
Di Redazione RHC - 17/11/2025

The Tor Project has released Tor Browser 15.0.1 , fixing critical security vulnerabilities inherited from Firefox 140.5.0esr. This maintenance release offers essential protections for privacy-consciou...

Immagine del sito
Google is ready to launch Gemini 3.0: will it really be the turning point in the AI race?
Di Redazione RHC - 16/11/2025

Google is getting closer to the official unveiling of Gemini 3.0 , the new artificial intelligence model destined to represent one of the most significant steps in the company’s strategy. According ...

Immagine del sito
The Louvre was deceived by two Belgian pranksters! They hung their painting next to the Mona Lisa.
Di Redazione RHC - 16/11/2025

Louvre security is under fire again after pranksters managed to trick guards and hang their painting in the same room as the Mona Lisa. Belgian duo Neel and Senne gained online notoriety by smuggling ...

Immagine del sito
Sam Altman and her husband Oliver and the dream of genetically modified children
Di Redazione RHC - 16/11/2025

The pursuit of immortality is a pervasive obsession in Silicon Valley. Likewise, the idea of perfecting children through genetic modification is another. Sam Altman, the man who brought artificial int...

Artificial General Intelligence (AGI): the first global standard for measuring it has been defined

On October 21, 2025, an international team of researchers from 29 leading institutions—including Stanford University, MIT, and the University of Calif...
Redazione RHC - 23/10/2025 - 20:59

$2.5 billion: The cost of the Jaguar Land Rover cyber attack.

Jaguar Land Rover continues to deal with the fallout from the cyber attack that paralyzed production, disrupted its dealer network, and jeopardized su...
Redazione RHC - 23/10/2025 - 18:35

Court orders NSO Group to stop using spyware against WhatsApp

A federal court has ordered Israeli company NSO Group (developer of the commercial spyware Pegasus) to stop using spyware to target and attack WhatsAp...
Redazione RHC - 23/10/2025 - 16:47

A serious bug in Microsoft 365 Copilot leads to data exfiltration via prompts

An advanced security flaw exists in M365 Copilot that allows attackers to exfiltrate sensitive information from tenants, such as recent emails, throug...
Redazione RHC - 23/10/2025 - 13:30

Russia legalizes white hat hackers with new law

Russia is preparing a new version of a bill legalizing white hat hackers . Two sources in government agencies and the cybersecurity industry told RBC ...
Redazione RHC - 23/10/2025 - 12:05

Azure under attack: Fake apps imitating Microsoft Teams and Azure Portal

A new wave of digital deception has hit the Microsoft Azure ecosystem, where newly discovered vulnerabilities have allowed cybercriminals to create ma...
Luca Galuppi - 23/10/2025 - 07:15
1 43 44 45 46 47 245

Artificial General Intelligence (AGI): the first global standard for measuring it has been defined

- October 23rd, 2025

On October 21, 2025, an international team of researchers from 29 leading institutions—including Stanford University, MIT, and the University of California, Berkeley —completed a study that marks a milestone in...

Facebook Linkedin X

$2.5 billion: The cost of the Jaguar Land Rover cyber attack.

- October 23rd, 2025

Jaguar Land Rover continues to deal with the fallout from the cyber attack that paralyzed production, disrupted its dealer network, and jeopardized supply chains. Vehicle production at major UK plants...

Facebook Linkedin X

Court orders NSO Group to stop using spyware against WhatsApp

- October 23rd, 2025

A federal court has ordered Israeli company NSO Group (developer of the commercial spyware Pegasus) to stop using spyware to target and attack WhatsApp users. Please note that Pegasus is...

Facebook Linkedin X

A serious bug in Microsoft 365 Copilot leads to data exfiltration via prompts

- October 23rd, 2025

An advanced security flaw exists in M365 Copilot that allows attackers to exfiltrate sensitive information from tenants, such as recent emails, through indirect command injection. Security researcher Adam Logue detailed...

Facebook Linkedin X

Russia legalizes white hat hackers with new law

- October 23rd, 2025

Russia is preparing a new version of a bill legalizing white hat hackers . Two sources in government agencies and the cybersecurity industry told RBC that the document has already...

Facebook Linkedin X

Azure under attack: Fake apps imitating Microsoft Teams and Azure Portal

- October 23rd, 2025

A new wave of digital deception has hit the Microsoft Azure ecosystem, where newly discovered vulnerabilities have allowed cybercriminals to create malicious apps that perfectly mimic official services like Microsoft...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE