Red Hot Cyber. The Cybersecurity Blog
BreachForums Resurrects After Yet Another FBI Shutdown
We’ve often quoted this phrase: “Fighting cybercrime is like pulling weeds: if you don’t completely eradicate them, they’ll grow back, much more vigorous than before,” an...
Gemini 3.0 Pro: Google prepares for the generational leap and aims to surpass GPT-5 and Claude 4.5
Over the past few days, some users have received a notification saying that their Gemini Advanced devices have been “upgraded from the previous generation model to the 3.0 Pro, the smartest mode...
Critical RCE exploit in Microsoft WSUS actively exploited. CISA warns: imminent risk
A global alert has been issued by the United States Cybersecurity and Infrastructure Security Agency (CISA) regarding the active exploitation of a critical remote code execution (RCE) flaw in Microsof...
No flesh, no bones, just code! Channel 4’s first AI presenter arrives.
On Monday 20 October, Channel 4 broadcast a full-length documentary hosted by a creative TV presenter powered entirely by artificial intelligence. ” I’m not real. For the first time on a B...
Russia and Cybercrime: A Balance Between Selective Repression and State Interest
The Russian cybercrime ecosystem has entered a phase of profound transformation, triggered by a combination of factors: unprecedented international pressure from law enforcement agencies, a shift in d...
Hackers can access Microsoft Teams chats and emails using access tokens
A recent discovery has revealed that hackers can exploit a flaw in Microsoft Teams on Windows to obtain encrypted authentication tokens , which grant unauthorized access to chats, emails, and files st...
FIA website hacked: personal data of Max Verstappen and over 7,000 drivers exposed
Security researchers have discovered vulnerabilities in an FIA website that contained sensitive personal information and documents relating to drivers, including world champion Max Verstappen. Ian Car...
Artificial General Intelligence (AGI): the first global standard for measuring it has been defined
On October 21, 2025, an international team of researchers from 29 leading institutions—including Stanford University, MIT, and the University of California, Berkeley —completed a study that marks a mi...
ChatGPT buys me bread! Atlas, the smart browser for macOS, is here.
OpenAI has released the ChatGPT Atlas browser for macOS. It integrates artificial intelligence directly into the interface and can perform tasks on web pages without having to switch between tabs. Atl...
F5 BIG-IP Vulnerability: 266,000 Devices at Risk Worldwide! 2,500 in Italy
The Cybersecurity and Infrastructure Security Agency (CISA) and the Multi-State Information Sharing & Analysis Center (MS-ISAC) are issuing this Joint Cybersecurity Advisory (CSA) in response to t...
Featured Articles

We’ve often quoted this phrase: “Fighting cybercrime is like pulling weeds: if you don’t completely eradicate them, they’ll grow back, much more vigorous than before,” an...

Over the past few days, some users have received a notification saying that their Gemini Advanced devices have been “upgraded from the previous generation model to the 3.0 Pro, the smartest mode...

A global alert has been issued by the United States Cybersecurity and Infrastructure Security Agency (CISA) regarding the active exploitation of a critical remote code execution (RCE) flaw in Microsof...

On Monday 20 October, Channel 4 broadcast a full-length documentary hosted by a creative TV presenter powered entirely by artificial intelligence. ” I’m not real. For the first time on a B...

The Russian cybercrime ecosystem has entered a phase of profound transformation, triggered by a combination of factors: unprecedented international pressure from law enforcement agencies, a shift in d...
Two critical bugs in Cisco ASA and FTD: score 9.9 and risk of remote code execution
Linux dances the samba… but hits a race condition. A critical flaw threatens the kernel.
They slept on networks for 393 days! Chinese state hackers and the BRICKSTORM backdoor
Code as we knew it is dead! Artificial Intelligence writes the future.
Cryptocurrencies, ransomware, and hamburgers: the fatal combo for Scattered Spider
Blade Runner Already Predicted Deepfake! Cyber Lessons from Film Classics

Two critical bugs in Cisco ASA and FTD: score 9.9 and risk of remote code execution
Redazione RHC - September 25th, 2025
Cisco has disclosed two critical vulnerabilities affecting its Secure Firewall Adaptive Security Appliance (ASA) and Secure Firewall Threat Defense (FTD) firewalls, as well as other networking products. Both flaws allow...

Linux dances the samba… but hits a race condition. A critical flaw threatens the kernel.
Redazione RHC - September 25th, 2025
Trend Research researcher Nicholas Zubrisky has reported a critical vulnerability in the ksmbd component of the Linux kernel that allows remote attackers to execute arbitrary code with maximum system privileges....

They slept on networks for 393 days! Chinese state hackers and the BRICKSTORM backdoor
Redazione RHC - September 25th, 2025
According to Google Threat Intelligence , the China-linked espionage group UNC5221 has carried out a series of successful intrusions into corporate networks since March of this year, exploiting previously unknown...

Code as we knew it is dead! Artificial Intelligence writes the future.
Redazione RHC - September 25th, 2025
Since 2013, the IEEE has published an annual interactive ranking of the most popular programming languages . However, traditional methods of measuring popularity may be losing their meaning today, due...

Cryptocurrencies, ransomware, and hamburgers: the fatal combo for Scattered Spider
Redazione RHC - September 25th, 2025
The U.S. Department of Justice and British police have charged Talha Jubair, 19, a resident of East London, who investigators believe is a key member of Scattered Spider , a...

Blade Runner Already Predicted Deepfake! Cyber Lessons from Film Classics
Daniela Farina - September 25th, 2025
“ Art is a mirror that reflects the soul of the beholder.” This quote, which captures the essence of our experience with cinema, takes on crucial significance when discussing cybersecurity....
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

