Red Hot Cyber. The Cybersecurity Blog
Featured Articles

In the technological field, the idea that the future development of generating systems depends inexorably on the expansion of nuclear capacity is taking root, pushing the sector’s players to identif...

The Tor Project has released Tor Browser 15.0.1 , fixing critical security vulnerabilities inherited from Firefox 140.5.0esr. This maintenance release offers essential protections for privacy-consciou...

Google is getting closer to the official unveiling of Gemini 3.0 , the new artificial intelligence model destined to represent one of the most significant steps in the company’s strategy. According ...

Louvre security is under fire again after pranksters managed to trick guards and hang their painting in the same room as the Mona Lisa. Belgian duo Neel and Senne gained online notoriety by smuggling ...

The pursuit of immortality is a pervasive obsession in Silicon Valley. Likewise, the idea of perfecting children through genetic modification is another. Sam Altman, the man who brought artificial int...
Artificial General Intelligence (AGI): the first global standard for measuring it has been defined
$2.5 billion: The cost of the Jaguar Land Rover cyber attack.
Court orders NSO Group to stop using spyware against WhatsApp
A serious bug in Microsoft 365 Copilot leads to data exfiltration via prompts
Russia legalizes white hat hackers with new law
Azure under attack: Fake apps imitating Microsoft Teams and Azure Portal

Artificial General Intelligence (AGI): the first global standard for measuring it has been defined
Redazione RHC - October 23rd, 2025
On October 21, 2025, an international team of researchers from 29 leading institutions—including Stanford University, MIT, and the University of California, Berkeley —completed a study that marks a milestone in...

$2.5 billion: The cost of the Jaguar Land Rover cyber attack.
Redazione RHC - October 23rd, 2025
Jaguar Land Rover continues to deal with the fallout from the cyber attack that paralyzed production, disrupted its dealer network, and jeopardized supply chains. Vehicle production at major UK plants...

Court orders NSO Group to stop using spyware against WhatsApp
Redazione RHC - October 23rd, 2025
A federal court has ordered Israeli company NSO Group (developer of the commercial spyware Pegasus) to stop using spyware to target and attack WhatsApp users. Please note that Pegasus is...

A serious bug in Microsoft 365 Copilot leads to data exfiltration via prompts
Redazione RHC - October 23rd, 2025
An advanced security flaw exists in M365 Copilot that allows attackers to exfiltrate sensitive information from tenants, such as recent emails, through indirect command injection. Security researcher Adam Logue detailed...

Russia legalizes white hat hackers with new law
Redazione RHC - October 23rd, 2025
Russia is preparing a new version of a bill legalizing white hat hackers . Two sources in government agencies and the cybersecurity industry told RBC that the document has already...

Azure under attack: Fake apps imitating Microsoft Teams and Azure Portal
Luca Galuppi - October 23rd, 2025
A new wave of digital deception has hit the Microsoft Azure ecosystem, where newly discovered vulnerabilities have allowed cybercriminals to create malicious apps that perfectly mimic official services like Microsoft...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

