Red Hot Cyber. The Cybersecurity Blog
Tasting the Exploit: HackerHood tests Microsoft WSUS CVE-2025-59287 Exploit
The cybersecurity landscape was recently rocked by the discovery of a critical Remote Code Execution (RCE) vulnerability in Microsoft’s Windows Server Update Services (WSUS) . Identified as CVE-2025-5...
ChatGPT Atlas: Researchers Discover How a Link Can Lead to Jailbreak
NeuralTrust researchers have discovered a vulnerability in OpenAI’s ChatGPT Atlas browser. This time, the attack vector is linked to the omnibox, the bar where users enter URLs or search queries...
Malware alert: Critical WordPress plugin vulnerabilities actively exploited
Wordfence is raising the alarm about a large-scale malware campaign in which attackers are exploiting critical vulnerabilities in the popular WordPress plugins GutenKit and Hunk Companion . The compan...
Gemini 3.0 Pro: What people who are trying it say
In recent days, a select few users have reported having access to the new Gemini 3.0 Pro model. Initial impressions suggest a significant improvement over the previous generation, so much so that many...
China promotes global AI governance under the United Nations
On October 27, the Blue Hall Forum on the theme of “Improving Global Governance and Building a Community with a Shared Future for Humanity” was held at the Ministry of Foreign Affairs in B...
Criminal Hackers Breach US Nuclear Weapons Production Facilities
Government hackers breached a nuclear weapons component manufacturing facility in the United States by exploiting vulnerabilities in Microsoft SharePoint. The incident affected the Kansas City Nationa...
BreachForums Resurrects After Yet Another FBI Shutdown
We’ve often quoted this phrase: “Fighting cybercrime is like pulling weeds: if you don’t completely eradicate them, they’ll grow back, much more vigorous than before,” an...
Gemini 3.0 Pro: Google prepares for the generational leap and aims to surpass GPT-5 and Claude 4.5
Over the past few days, some users have received a notification saying that their Gemini Advanced devices have been “upgraded from the previous generation model to the 3.0 Pro, the smartest mode...
Critical RCE exploit in Microsoft WSUS actively exploited. CISA warns: imminent risk
A global alert has been issued by the United States Cybersecurity and Infrastructure Security Agency (CISA) regarding the active exploitation of a critical remote code execution (RCE) flaw in Microsof...
No flesh, no bones, just code! Channel 4’s first AI presenter arrives.
On Monday 20 October, Channel 4 broadcast a full-length documentary hosted by a creative TV presenter powered entirely by artificial intelligence. ” I’m not real. For the first time on a B...
Featured Articles

The cybersecurity landscape was recently rocked by the discovery of a critical Remote Code Execution (RCE) vulnerability in Microsoft’s Windows Server Update Services (WSUS) . Identified as CVE-2025...

NeuralTrust researchers have discovered a vulnerability in OpenAI’s ChatGPT Atlas browser. This time, the attack vector is linked to the omnibox, the bar where users enter URLs or search queries...

Wordfence is raising the alarm about a large-scale malware campaign in which attackers are exploiting critical vulnerabilities in the popular WordPress plugins GutenKit and Hunk Companion . The compan...

In recent days, a select few users have reported having access to the new Gemini 3.0 Pro model. Initial impressions suggest a significant improvement over the previous generation, so much so that many...

On October 27, the Blue Hall Forum on the theme of “Improving Global Governance and Building a Community with a Shared Future for Humanity” was held at the Ministry of Foreign Affairs in B...
ChatGPT Atlas: Researchers Discover How a Link Can Lead to Jailbreak
Malware alert: Critical WordPress plugin vulnerabilities actively exploited
ClayRat: The spyware that targets Android users with self-propagation
Be careful what you tell AI! It could be confidential data
Europe vs. Silicon Valley: “AI First” kicks off in Turin with von der Leyen
“YOU ARE WORTH IT, YOU’RE NEVER TOO YOUNG TO CHANGE THE WORLD”: Nicola Bellotti’s vision

ChatGPT Atlas: Researchers Discover How a Link Can Lead to Jailbreak
Redazione RHC - October 29th, 2025
NeuralTrust researchers have discovered a vulnerability in OpenAI's ChatGPT Atlas browser. This time, the attack vector is linked to the omnibox, the bar where users enter URLs or search queries....

Malware alert: Critical WordPress plugin vulnerabilities actively exploited
Redazione RHC - October 29th, 2025
Wordfence is raising the alarm about a large-scale malware campaign in which attackers are exploiting critical vulnerabilities in the popular WordPress plugins GutenKit and Hunk Companion . The company blocked...

ClayRat: The spyware that targets Android users with self-propagation
Redazione RHC - October 29th, 2025
The ClayRat spyware campaign is expanding rapidly and increasingly targeting Android users. According to Zimperium, the malware is actively spreading among Russian users through fake websites and Telegram channels, masquerading...

Be careful what you tell AI! It could be confidential data
Filippo Boni - October 29th, 2025
In an age where every question is answered with a simple tap, we users have perhaps gotten a little too comfortable with the new AI-based assistants. Ultimately, it makes little...

Europe vs. Silicon Valley: “AI First” kicks off in Turin with von der Leyen
Carlo Denza - October 28th, 2025
Von der Leyen launches "AI First" at Italian Tech Week: three obstacles to overcome and a €2 billion startup lost along the way. Turin, October 3, 2025. Before thousands of...

“YOU ARE WORTH IT, YOU’RE NEVER TOO YOUNG TO CHANGE THE WORLD”: Nicola Bellotti’s vision
Olivia Terragni - October 28th, 2025
We often try to explain the hybrid, simultaneous, and contradictory world in which young people live in perpetual connection, but the truth is that as adults, we struggle to understand...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

