Welcome to Red Hot Cyber | Cybersecurity News
Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Crowdstrike 320×100
Banner Desktop

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

But what kind of Sovereign AI is running on the servers and algorithms of a US company!

This year, OpenAI announced a series of projects with foreign governments to create "sovereign AI" systems. According to the company,...
Redazione RHC - 16 October 2025

Rootkit on Cisco Devices: Operation Zero Disk Discovered

A sophisticated attack campaign dubbed “Operation Zero Disk” has recently been detected, where threat actors are actively exploiting a critical...
Redazione RHC - 15 October 2025

Australia targeted by Chinese hackers: New intelligence report revealed

The Australian Signals Directorate (ASD) has issued a new warning about the growing activity of Chinese Communist Party-sponsored hacker groups,...
Redazione RHC - 15 October 2025

Flirt, eroticism, and the end of censorship! OpenAI will change the rules of ChatGPT.

OpenAI is preparing a major change to ChatGPT's rules: starting in December, age-verified users will be able to interact with...
Redazione RHC - 15 October 2025

Harvard University Hit by Hacking Campaign Using Oracle E-Business Suite

Harvard University has confirmed that it was hit by a recent campaign that exploited a vulnerability in Oracle's E-Business Suite...
Redazione RHC - 15 October 2025

“Double Bind” Leads to GPT-5 Jailbreak: The AI That Was Convinced It Was Schizophrenic

A new and unusual jailbreaking method, the art of circumventing the limitations imposed on artificial intelligence, has reached our editorial...
Luca Vinciguerra - 15 October 2025

New blackmail: if you don’t pay, we’ll feed all your data to artificial intelligence!

The hacker group LunaLock has added a new element to the classic extortion scheme, preying on the fears of artists and clients. On August 30, a message appeared on the...
Share on Facebook Share on LinkedIn Share on X

Jaguar Land Rover victim of hacker attack: production halted!

Automaker Jaguar Land Rover (JLR) announced that it was forced to disable several systems due to a hacker attack. The incident appears to have impacted the automaker's manufacturing and retail...
Share on Facebook Share on LinkedIn Share on X

LockBit 5.0: Signs of a New and Possible “Rebirth”?

LockBit represents one of the longest-running and most structured ransomware gangs of recent years, with a Ransomware-as-a-Service (RaaS) model that has profoundly impacted the criminal ecosystem. Following the international operation...
Share on Facebook Share on LinkedIn Share on X

The KING of DDoS! Cloudflare blocks a monstrous 11.5 terabit-per-second attack.

The record for the largest DDoS attack ever recorded in June 2025 has already been broken. Cloudflare said it recently blocked the largest DDoS attack in history, which peaked at...
Share on Facebook Share on LinkedIn Share on X

AI will grow by 50% and so will your anxiety about your electricity bill.

The global data center industry is preparing for a sharp increase in computing platforms for AI demands. According to Goldman Sachs, installed data center capacity will grow by approximately 50%...
Share on Facebook Share on LinkedIn Share on X

Cloudflare also hacked in the Salesforce incident! Cloud risks affect everyone.

A data intrusion was detected by Cloudflare, where an experienced attacker was able to access and steal sensitive customer data from the company's Salesforce instance. The breach was part of...
Share on Facebook Share on LinkedIn Share on X

Critical vulnerability in IIS Web Deploy: PoC exploit is now public

This week, a proof-of-concept exploit was published for CVE-2025-53772, a critical remote code execution vulnerability in Microsoft's IIS Web Deploy (msdeploy) tool, which has raised urgent alarms in the .NET...
Share on Facebook Share on LinkedIn Share on X

Tencent Challenges the Giants! New Hunyuan-MT Beats Google Translate and GPT-4.1

Chinese company Tencent has made public the source code of a new set of Hunyuan-MT language models, specially optimized for translation tasks. The developers claim that the algorithms perform better...
Share on Facebook Share on LinkedIn Share on X

OpenAI Puts Parents in Control: Parental Controls Arrive on ChatGPT

At a time when controversy over the impact of artificial intelligence on youth mental health is growing, the introduction of parental controls for ChatGPT has been announced as a measure...
Share on Facebook Share on LinkedIn Share on X

Lovable, the Swedish AI unicorn that’s revolutionizing programming

This year's TechBBQ conference was packed to capacity at Copenhagen's Bella Center when Anton Osika, co-founder of the AI-powered programming app Lovable, took the stage. The fundamental concept of Lovable...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sito
DIG AI: The Dark Web’s New AI Tool for Cybercrime
Redazione RHC - 21/12/2025

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…

Immagine del sito
Airbus Eyes Sovereign Cloud to Mitigate US Data Risks
Redazione RHC - 21/12/2025

In recent months, a question has been emerging with increasing insistence on European corporate boards: is the US cloud really safe for all companies? Especially for those operating in strategic sectors or with economic, industrial,…

Immagine del sito
North Korean Hackers Steal $2 Billion in Crypto, Targeting DeFi Sector
Redazione RHC - 21/12/2025

In 2025, North Korean hackers stole a record $2 billion in cryptocurrency , 51% more than the previous year. However, the number of attacks has decreased, while the damage has increased. According to Chainalysis, North…

Immagine del sito
Linux Kernel CVE-2025-68260 Vulnerability Fixed: Rust Code at Risk
Redazione RHC - 19/12/2025

The world of technology is a veritable battlefield, where coding geniuses challenge malicious attackers every day with exploits and security patches. That’s why the recent discovery of a vulnerability in the Linux kernel has caused…

Immagine del sito
HPE OneView Vulnerability CVE-2025-37164: Critical Security Update Required
Redazione RHC - 18/12/2025

Cybersecurity is a serious issue, especially when it comes to vulnerabilities that can compromise an entire system. Well, Hewlett Packard Enterprise (HPE) has just raised the alarm about a truly worrying security flaw in its…