Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Russian Federation’s Roskomnadzor has announced that it continues to impose systematic restrictions on the messaging app WhatsApp due to violations of Russian law. According to the agency, the s...

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...
Magnus Carlsen beats ChatGPT at chess without losing a piece!
Putin imposes restrictions on foreign software that has “strangled” Russia
How an LLM Really Works: Costs, Infrastructure, and the Technical Choices Behind Big Language Models
Sophos fixes vulnerabilities in Intercept X for Windows
Three score 10 bugs have been detected in Cisco ISE and ISE-PIC: urgent updates required.
OMGCable: The Thin Red Line Between Penetration Testing and Covert Surveillance

Magnus Carlsen beats ChatGPT at chess without losing a piece!
Redazione RHC - July 17th, 2025
Magnus Carlsen beat ChatGPT at chess without losing a single piece, while his virtual opponent lost all his pawns. The Norwegian grandmaster posted screenshots of the game on the social...

Putin imposes restrictions on foreign software that has “strangled” Russia
Redazione RHC - July 17th, 2025
The Kremlin press office reported that Russian President Vladimir Putin has instructed the government to develop additional restrictions on software (including "communications services")produced in hostile countries by September 1, 2025....

How an LLM Really Works: Costs, Infrastructure, and the Technical Choices Behind Big Language Models
Redazione RHC - July 17th, 2025
In recent years, large language models (LLM, Large Language Models) such as GPT, Claude, or LLaMA have demonstrated extraordinary capabilities in understanding and generating natural language. However, behind the scenes,...

Sophos fixes vulnerabilities in Intercept X for Windows
Redazione RHC - July 17th, 2025
Sophos announced that it has resolved three separate security vulnerabilities in Sophos Intercept X for Windows and its installer. These vulnerabilities, designated CVE-2024-13972, CVE-2025-7433, and CVE-2025-7472, have been rated High...

Three score 10 bugs have been detected in Cisco ISE and ISE-PIC: urgent updates required.
Redazione RHC - July 17th, 2025
Several vulnerabilities have been identified in the Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) products that could allow a remote attacker to execute arbitrary commands...

OMGCable: The Thin Red Line Between Penetration Testing and Covert Surveillance
Redazione RHC - July 16th, 2025
In 2021, during one of my explorations into the increasingly blurred boundary between hardware and cybersecurity, I wrote an article with a title that today sounds almost prophetic: “Even a...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

