Red Hot Cyber. The Cybersecurity Blog
Artificial General Intelligence (AGI): the first global standard for measuring it has been defined
On October 21, 2025, an international team of researchers from 29 leading institutions—including Stanford University, MIT, and the University of California, Berkeley —completed a study that marks a mi...
ChatGPT buys me bread! Atlas, the smart browser for macOS, is here.
OpenAI has released the ChatGPT Atlas browser for macOS. It integrates artificial intelligence directly into the interface and can perform tasks on web pages without having to switch between tabs. Atl...
F5 BIG-IP Vulnerability: 266,000 Devices at Risk Worldwide! 2,500 in Italy
The Cybersecurity and Infrastructure Security Agency (CISA) and the Multi-State Information Sharing & Analysis Center (MS-ISAC) are issuing this Joint Cybersecurity Advisory (CSA) in response to t...
The Intel 386 processor turns 40: the 32-bit era began
October 20, 2025, marks a significant anniversary in the history of computing: the Intel 80386 processor, also known as the i386 , celebrates its 40th birthday . And it’s a big birthday! Launche...
Intel releases urgent patches for new Spectre variant
VUSec researchers have presented a paper titled “Training Solo,” which challenges the fundamental principles of protection against Spectre-v2 attacks. Previously , the domain isolation mec...
Famous hackers: Vladimir Levin and the first online bank robbery.
Today we’ll meet another hacker from the past. He’s Vladimir Levin, a Russian hacker from St. Petersburg (Владимир Леонидович Левин), who became famous for breaking into the servers of the...
Cyber Attack on European Airports: Everest Ransomware Claims Claim
On September 20, we reported on a cyberattack that paralyzed several European airports, including Brussels, Berlin, and London Heathrow. This was a supply chain attack that exploited the compromise of...
Inmates hack prison: sentences reduced, funds transferred, and unauthorized visits
The Romanian penitentiary system has found itself at the center of a major digital scandal: inmates in Târgu Jiu hacked the PNA’s internal platform and, for several months, managed data on priso...
WiFi: From Marconi’s Origins to the Wireless Network We Know Today
Today, we live in a world where WiFi is a fundamental necessity, but how did this technology, now taken for granted, come about? How did it then develop into the network we now use every day? In this ...
Operation SIMCARTEL: 1,200 SIM boxes and 40,000 SIM cards stopped by Europol
On October 10, 2025, Latvian authorities conducted a day of action that resulted in the arrest of five Latvian citizens suspected of running a large-scale cyber fraud network. The operation, dubbed SI...
Featured Articles

On October 21, 2025, an international team of researchers from 29 leading institutions—including Stanford University, MIT, and the University of California, Berkeley —completed a study that marks ...

OpenAI has released the ChatGPT Atlas browser for macOS. It integrates artificial intelligence directly into the interface and can perform tasks on web pages without having to switch between tabs. Atl...

The Cybersecurity and Infrastructure Security Agency (CISA) and the Multi-State Information Sharing & Analysis Center (MS-ISAC) are issuing this Joint Cybersecurity Advisory (CSA) in response to t...

October 20, 2025, marks a significant anniversary in the history of computing: the Intel 80386 processor, also known as the i386 , celebrates its 40th birthday . And it’s a big birthday! Launche...

VUSec researchers have presented a paper titled “Training Solo,” which challenges the fundamental principles of protection against Spectre-v2 attacks. Previously , the domain isolation mec...
Poisoned AI! 250 Malicious Documents Are Enough to Compromise an LLM
Spyware yes, spyware no: it’s just a prospect! NSO Group is now under US control.
Electricians and plumbers: They are the real winners of the AI boom
Towards “legal technology”: legal education in the digital age must be technological.
ProxyCommand: The Little String That Opens a Port for Exploits
The AI bubble: fears of a new technological meltdown grow

Poisoned AI! 250 Malicious Documents Are Enough to Compromise an LLM
Redazione RHC - October 13th, 2025
Researchers at Anthropic, in collaboration with the UK government's AI Safety Institute, the Alan Turing Institute, and other academic institutions, reported that just 250 specially crafted malicious documents were enough...

Spyware yes, spyware no: it’s just a prospect! NSO Group is now under US control.
Redazione RHC - October 13th, 2025
Israeli company NSO Group, developer of the infamous Pegasus spyware , recently came under the control of American investors. A company spokesperson announced that the new funding amounts to tens...

Electricians and plumbers: They are the real winners of the AI boom
Sandro Sana - October 13th, 2025
Jensen Huang, CEO of NVIDIA, has openly stated that the real winners in the AI boom, at least in the short to medium term, will be electricians, plumbers, and skilled...

Towards “legal technology”: legal education in the digital age must be technological.
Paolo Galdieri - October 13th, 2025
As a criminal lawyer and professor of Criminal Computer Law, a student of the late Vittorio Frosini, a pioneer of legal informatics in Italy, I constantly reflect on the state...

ProxyCommand: The Little String That Opens a Port for Exploits
Antonio Piazzolla - October 13th, 2025
Yesterday, a vulnerability in OpenSSH, CVE-2025-61984, was published that potentially allows command execution on the client when ProxyCommand is used with usernames containing control characters (e.g., newlines). Some OpenSSH input...

The AI bubble: fears of a new technological meltdown grow
Redazione RHC - October 13th, 2025
At DevDay, OpenAI's annual conference this week, CEO Sam Altman took questions from reporters, an increasingly rare occurrence among tech leaders. Altman acknowledged the uncertainty surrounding the AI industry today,...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

