Red Hot Cyber. The Cybersecurity Blog
China promotes global AI governance under the United Nations
On October 27, the Blue Hall Forum on the theme of “Improving Global Governance and Building a Community with a Shared Future for Humanity” was held at the Ministry of Foreign Affairs in B...
Criminal Hackers Breach US Nuclear Weapons Production Facilities
Government hackers breached a nuclear weapons component manufacturing facility in the United States by exploiting vulnerabilities in Microsoft SharePoint. The incident affected the Kansas City Nationa...
BreachForums Resurrects After Yet Another FBI Shutdown
We’ve often quoted this phrase: “Fighting cybercrime is like pulling weeds: if you don’t completely eradicate them, they’ll grow back, much more vigorous than before,” an...
Gemini 3.0 Pro: Google prepares for the generational leap and aims to surpass GPT-5 and Claude 4.5
Over the past few days, some users have received a notification saying that their Gemini Advanced devices have been “upgraded from the previous generation model to the 3.0 Pro, the smartest mode...
Critical RCE exploit in Microsoft WSUS actively exploited. CISA warns: imminent risk
A global alert has been issued by the United States Cybersecurity and Infrastructure Security Agency (CISA) regarding the active exploitation of a critical remote code execution (RCE) flaw in Microsof...
No flesh, no bones, just code! Channel 4’s first AI presenter arrives.
On Monday 20 October, Channel 4 broadcast a full-length documentary hosted by a creative TV presenter powered entirely by artificial intelligence. ” I’m not real. For the first time on a B...
Russia and Cybercrime: A Balance Between Selective Repression and State Interest
The Russian cybercrime ecosystem has entered a phase of profound transformation, triggered by a combination of factors: unprecedented international pressure from law enforcement agencies, a shift in d...
Hackers can access Microsoft Teams chats and emails using access tokens
A recent discovery has revealed that hackers can exploit a flaw in Microsoft Teams on Windows to obtain encrypted authentication tokens , which grant unauthorized access to chats, emails, and files st...
FIA website hacked: personal data of Max Verstappen and over 7,000 drivers exposed
Security researchers have discovered vulnerabilities in an FIA website that contained sensitive personal information and documents relating to drivers, including world champion Max Verstappen. Ian Car...
Artificial General Intelligence (AGI): the first global standard for measuring it has been defined
On October 21, 2025, an international team of researchers from 29 leading institutions—including Stanford University, MIT, and the University of California, Berkeley —completed a study that marks a mi...
Featured Articles

On October 27, the Blue Hall Forum on the theme of “Improving Global Governance and Building a Community with a Shared Future for Humanity” was held at the Ministry of Foreign Affairs in B...

Government hackers breached a nuclear weapons component manufacturing facility in the United States by exploiting vulnerabilities in Microsoft SharePoint. The incident affected the Kansas City Nationa...

We’ve often quoted this phrase: “Fighting cybercrime is like pulling weeds: if you don’t completely eradicate them, they’ll grow back, much more vigorous than before,” an...

Over the past few days, some users have received a notification saying that their Gemini Advanced devices have been “upgraded from the previous generation model to the 3.0 Pro, the smartest mode...

A global alert has been issued by the United States Cybersecurity and Infrastructure Security Agency (CISA) regarding the active exploitation of a critical remote code execution (RCE) flaw in Microsof...
Electronic warfare (EW) between the USA, China, South and North Korea (part two)
North Korea’s cyberwarfare and its cyber army (part one)
Making the cyber world a safer and better place: an interview with W1ntermute
Ada Lovelace and Charles Babbage, pioneers of programmable computing
Dharma/Crysis: Overview and adversary tracking
Avoiding the fis-hack-erman’s hook (aka Detecting a Phishing email)
Electronic warfare (EW) between the USA, China, South and North Korea (part two)
Olivia Terragni - December 17th, 2021
Author: Olivia TerragniPubblication Date: 13/12/2021 Given that North Korean cyberattacks are not a future threat, but already a FACT, we are already wondering how to deal with the election of...

North Korea’s cyberwarfare and its cyber army (part one)
Olivia Terragni - December 17th, 2021
Author: Olivia Terragni Pubblication date: 13/12/2021 During the night, only one bright spot lights up in North Korea: the city of Pyongyang. Perhaps, due to the dark that surrounds it,...

Making the cyber world a safer and better place: an interview with W1ntermute
Olivia Terragni - November 12th, 2021
Author: Olivia terragni Pubblication Date: 11/11/2021 W1ntermute aka Sofya Ivanov is a woman who works in the cybersecurity industry as a network security analyst and open-source intelligence (OSINT) specialist. This...

Ada Lovelace and Charles Babbage, pioneers of programmable computing
Antonio Piovesan - October 4th, 2021
Author: Antonio Piovesan Pubblication date: 28/09/2021 Introduction - Age of machines Great Britain, middle decades of the 19th century, times of unprecedented engineering ambitions. Engineering, transportation, communications, architecture, science and...

Dharma/Crysis: Overview and adversary tracking
Emanuele De Lucia - September 17th, 2021
Author: Emanuele De Lucia Pubblication date: 17/09/2021 This report presents an overview about Dharma/Crysis ransomware. This piece of malware is often observed as late-stage payload in attacks against internet-facing systems,...

Avoiding the fis-hack-erman’s hook (aka Detecting a Phishing email)
Antonio Piovesan - August 22nd, 2021
Author: Antonio PiovesanPubblication Date: 09/08/2021 With the increase of ransomware infections - often instigated through phishing emails, it's very important/crucial to take proactive measures to help protect yourself and your...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

