Red Hot Cyber. The Cybersecurity Blog
Trump-Xi Summit: A Truce That Doesn’t Benefit Europe
After years of tensions, tariffs, mutual accusations, and trade wars that have shattered the global balance of power, the long-awaited meeting between Donald Trump and Xi Jinping has finally taken pla...
Cloud yes or Cloud no: When the Digital Sky Darkens
The outage of Microsoft’s cloud services, which occurred just hours before the release of its quarterly results, is just the latest in a long series of outages that are exposing a structural vul...
US builds largest AI supercomputer in history
The U.S. Department of Energy (DOE) has entered into a strategic collaboration with Nvidia and Oracle to build seven next-generation AI-powered supercomputers , set to revolutionize scientific researc...
Microsoft 365 goes down: DNS anomaly paralyzes services worldwide
A DNS service outage was detected by Microsoft on October 29, 2025, impacting access to critical services such as Microsoft Azure and Microsoft 365. An anomaly was detected at 21:37 GMT+5:30, causing ...
Tor Browser Says No to Artificial Intelligence! Security Comes First
Interestingly, while major companies like Microsoft and Google are actively adding AI features to their browsers, the Tor development team has chosen to remove them. @henry, a Tor project contributor,...
Tasting the Exploit: HackerHood tests Microsoft WSUS CVE-2025-59287 Exploit
The cybersecurity landscape was recently rocked by the discovery of a critical Remote Code Execution (RCE) vulnerability in Microsoft’s Windows Server Update Services (WSUS) . Identified as CVE-2025-5...
ChatGPT Atlas: Researchers Discover How a Link Can Lead to Jailbreak
NeuralTrust researchers have discovered a vulnerability in OpenAI’s ChatGPT Atlas browser. This time, the attack vector is linked to the omnibox, the bar where users enter URLs or search queries...
Malware alert: Critical WordPress plugin vulnerabilities actively exploited
Wordfence is raising the alarm about a large-scale malware campaign in which attackers are exploiting critical vulnerabilities in the popular WordPress plugins GutenKit and Hunk Companion . The compan...
Gemini 3.0 Pro: What people who are trying it say
In recent days, a select few users have reported having access to the new Gemini 3.0 Pro model. Initial impressions suggest a significant improvement over the previous generation, so much so that many...
China promotes global AI governance under the United Nations
On October 27, the Blue Hall Forum on the theme of “Improving Global Governance and Building a Community with a Shared Future for Humanity” was held at the Ministry of Foreign Affairs in B...
Featured Articles

After years of tensions, tariffs, mutual accusations, and trade wars that have shattered the global balance of power, the long-awaited meeting between Donald Trump and Xi Jinping has finally taken pla...

The outage of Microsoft’s cloud services, which occurred just hours before the release of its quarterly results, is just the latest in a long series of outages that are exposing a structural vul...

The U.S. Department of Energy (DOE) has entered into a strategic collaboration with Nvidia and Oracle to build seven next-generation AI-powered supercomputers , set to revolutionize scientific researc...

A DNS service outage was detected by Microsoft on October 29, 2025, impacting access to critical services such as Microsoft Azure and Microsoft 365. An anomaly was detected at 21:37 GMT+5:30, causing ...

Interestingly, while major companies like Microsoft and Google are actively adding AI features to their browsers, the Tor development team has chosen to remove them. @henry, a Tor project contributor,...
Vannevar Bush’s Visionary Essay: “As We May Think”.
RHC ransomware Data Room – January 2022
Satoshi Nakamoto: let’s discover the mysterious inventor of Bitcoin.
Nuclear rearmament, cyber guerrillas and cyber crime.
Why privacy does not exist.
Electronic warfare (EW) between the USA, China, South and North Korea (part two)

Vannevar Bush’s Visionary Essay: “As We May Think”.
Tara Lie - May 7th, 2022
Author: Massimiliano BrolliOriginal Publication Date: 15/11/2021Translator: Tara Lie Today I would like to bring a visionary essay to light, a source of inspiration for many scientists that have contributed to...

RHC ransomware Data Room – January 2022
Luca Mella - February 4th, 2022
Author: Dott. Luca Mella, Cyber Security Expert (founder doubleextortion.com) Translate: Vincenzo Marcovecchio Pubblication Date: 5/02/2022 In recent years, the ransomware phenomenon has been so disruptive that it heavily influences the...

Satoshi Nakamoto: let’s discover the mysterious inventor of Bitcoin.
Massimiliano Brolli - January 27th, 2022
Autore: Brolli Massimiliano Translate: Vincenzo Marcovecchio Pubblication date: 1/06/2021 The true identity of the creator of Bitcoin is one of the greatest mysteries in the tech world. Over the years,...

Nuclear rearmament, cyber guerrillas and cyber crime.
Roberto Villani - January 10th, 2022
Author: Roberto Villani Tanslate: Vincenzo Marcovecchio Pubblication date: 19/12/2021 Why will the cyberg wars, indeed the cyber-guerrillas, be more and more present and involve us more and more? The short...

Why privacy does not exist.
Redazione RHC - December 18th, 2021
Author Massimiliano Brolli Translation: Vincenzo Marcovecchio Pubblication date: 18/12/2021 Privacy, privacy, privacy, ... privacy comes first. How many times have we heard this sentence? Yes, because we talk a lot...
Electronic warfare (EW) between the USA, China, South and North Korea (part two)
Olivia Terragni - December 17th, 2021
Author: Olivia TerragniPubblication Date: 13/12/2021 Given that North Korean cyberattacks are not a future threat, but already a FACT, we are already wondering how to deal with the election of...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

