Red Hot Cyber. The Cybersecurity Blog
Bus becomes travelling museum of retro computers in UK
In the UK, father and son Jason and Luke Stoner have transformed an old school bus into a traveling museum dedicated to retro computers and game consoles. The inspiration came when Luke visited the fa...
100 years of Italian Intelligence! Mattarella celebrates the SIM’s centenary at the Quirinale Palace
October 15, 2025 marks an anniversary of exceptional importance in the history of Italian national security: one hundred years since the birth of the Military Information Service (SIM) , the country&#...
But what kind of Sovereign AI is running on the servers and algorithms of a US company!
This year, OpenAI announced a series of projects with foreign governments to create “sovereign AI” systems. According to the company, some of these agreements are currently being negotiate...
Flirt, eroticism, and the end of censorship! OpenAI will change the rules of ChatGPT.
OpenAI is preparing a major change to ChatGPT’s rules: starting in December, age-verified users will be able to interact with adult content, including erotica. The company’s CEO, Sam Altma...
“Double Bind” Leads to GPT-5 Jailbreak: The AI That Was Convinced It Was Schizophrenic
A new and unusual jailbreaking method, the art of circumventing the limitations imposed on artificial intelligence, has reached our editorial office. It was developed by computer security researcher A...
AI Alignment: Where Does AI Learn Right and Wrong?
The other day on LinkedIn, I found myself having a conversation with someone who was seriously interested in the topic of artificial intelligence applied to law. It wasn’t one of those barroom c...
Microsoft Patch Tuesday: 175 vulnerabilities fixed and two zero-days exploited
In its latest update, the tech giant fixed 175 vulnerabilities affecting its core products and underlying systems, including two actively exploited zero-day vulnerabilities , the company said in its l...
12 security bugs discovered in Ivanti Endpoint Manager (EPM). Update now!
Ivanti has published 13 vulnerabilities in its Endpoint Manager (EPM) software , including two high-severity flaws that could allow remote code execution and privilege escalation . Despite the lack of...
WhatsApp Web in the crosshairs! How the worm that distributes the banking Trojan works
Sophos analysts have discovered a complex malware operation by security experts that uses the popular messaging service WhatsApp to spread banking Trojans, targeting Brazilian banks and cryptocurrency...
RMPocalypse: A critical bug in AMD SEV-SNP threatens cloud security.
A critical vulnerability has been identified in the AMD SEV-SNP hardware security architecture, impacting major cloud providers (AWS, Microsoft Azure, and Google Cloud) . This flaw allows malicious hy...
Featured Articles

In the UK, father and son Jason and Luke Stoner have transformed an old school bus into a traveling museum dedicated to retro computers and game consoles. The inspiration came when Luke visited the fa...

October 15, 2025 marks an anniversary of exceptional importance in the history of Italian national security: one hundred years since the birth of the Military Information Service (SIM) , the country&#...

This year, OpenAI announced a series of projects with foreign governments to create “sovereign AI” systems. According to the company, some of these agreements are currently being negotiate...

OpenAI is preparing a major change to ChatGPT’s rules: starting in December, age-verified users will be able to interact with adult content, including erotica. The company’s CEO, Sam Altma...

A new and unusual jailbreaking method, the art of circumventing the limitations imposed on artificial intelligence, has reached our editorial office. It was developed by computer security researcher A...
DeepSeek challenges AI giants: 50% cost and API cuts
Oracle E-Business Suite 9.8 Vulnerability: Urgent Updates Needed
iPad with M5 chip spotted: Promising performance on Geekbench
China launches underwater data center to reduce carbon footprint
Apple in the crosshairs? Alleged 9GB data breach claim on Darkforums
When AI writes poetry: is the future of human creativity over?

DeepSeek challenges AI giants: 50% cost and API cuts
Redazione RHC - October 6th, 2025
The Chinese company DeepSeek has presented an experimental version of its language model, DeepSeek-V3.2-Exp, which for the first time implements its own version of sparse attention, a technique that significantly...

Oracle E-Business Suite 9.8 Vulnerability: Urgent Updates Needed
Redazione RHC - October 5th, 2025
Oracle has published a security advisory regarding a critical vulnerability identified as CVE-2025-61882 in the Oracle E-Business Suite . The flaw can be exploited remotely without authentication , potentially allowing...

iPad with M5 chip spotted: Promising performance on Geekbench
Redazione RHC - October 5th, 2025
An unknown iPad with an M5 chip has been spotted on Geekbench . The device scored 4,133 in the single-core test and 15,437 in the multi-core test . The listing...

China launches underwater data center to reduce carbon footprint
Redazione RHC - October 5th, 2025
China is preparing to launch one of the first commercial underwater data center projects . In mid-October, a capsule containing servers will be lowered into the sea off the coast...

Apple in the crosshairs? Alleged 9GB data breach claim on Darkforums
Inva Malaj - October 5th, 2025
Author : Inva Malaj and Raffaela Crisci 04/10/2025 – Darkforums.st: “303” Claims 9GB Data Breach on Apple.com In the early hours of October 4, 2025, a data breach claim emerged...

When AI writes poetry: is the future of human creativity over?
Redazione RHC - October 5th, 2025
In 1950, Alan Turing, considered the father of artificial intelligence, was still wondering "Can machines think?" Today, more than seventy years later, public perception seems to have changed radically: more...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE