Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Anthropic has released Claude Opus 4.5 , its new flagship model, which the company says is the most powerful version yet and ranks at the top of the class for practical programming, agent-based produc...

On November 24, Alibaba announced Qwen3Max, which had been in public beta for a week , and had already surpassed 10 million downloads. It was a record that shattered all others. In a very short time, ...

Remote work has given employees freedom , but with it has also come digital surveillance . We discussed this some time ago in an article, reporting that these monitoring tools are also coming to Micro...

On November 13, Eurofiber France, a respected provider of fiber optic network and VPN solutions to many of France’s leading companies, discovered that its systems had been compromised by criminal ha...

This fall, we’ve had quite a bit of a cloud headache, I don’t know if you’ve noticed. That is, AWS, Azure , and then Cloudflare . All of them down, one after the other. A series of outages that ...
The Illicit Distribution of Intimate Images: A Threat to Women’s Freedom
Vault7 with a Chinese twist: China’s secret global surveillance system exposed
Whisper Leak: The New Side-Channel Attack That Steals Messages with LLMs
QNAP fixes 7 critical NAS bugs discovered at Pwn2Own Ireland 2025
Artificial intelligence surpasses humans, but not in every field. Is AGI near or far away?
Techno-optimism vs. the power of control: are we the greatest threat from AI?

The Illicit Distribution of Intimate Images: A Threat to Women’s Freedom
Paolo Galdieri - November 10th, 2025
This is the fourth in a series of articles analyzing gender-based violence in the digital context, in anticipation of November 25, the International Day for the Elimination of Violence against...

Vault7 with a Chinese twist: China’s secret global surveillance system exposed
Redazione RHC - November 10th, 2025
Only the flag changes, but the result is always the same. In 2017, WikiLeaks published Vault7 , a leak that exposed the CIA's arsenal: toolkits for penetrating smartphones, smart TVs,...

Whisper Leak: The New Side-Channel Attack That Steals Messages with LLMs
Redazione RHC - November 10th, 2025
Microsoft has announced a new side-channel attack on remote language models. It allows a passive attacker, capable of viewing encrypted network traffic, to use artificial intelligence to determine the topic...

QNAP fixes 7 critical NAS bugs discovered at Pwn2Own Ireland 2025
Redazione RHC - November 10th, 2025
QNAP has fixed seven critical zero-day vulnerabilities in its Network Attached Storage (NAS) operating systems after a group of researchers successfully exploited them at Pwn2Own Ireland 2025 , held in...

Artificial intelligence surpasses humans, but not in every field. Is AGI near or far away?
Redazione RHC - November 10th, 2025
According to experts, humanity has entered a new stage in the development of artificial intelligence: an era in which systems no longer simply assist humans , but are able to...

Techno-optimism vs. the power of control: are we the greatest threat from AI?
Olivia Terragni - November 9th, 2025
Imagine a futuristic city split in half: on one side, glittering towers of innovation; on the other, chaos and the shadows of lost control. This isn't a dystopian vision, but...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

