Red Hot Cyber. The Cybersecurity Blog
Trump-Xi Summit: A Truce That Doesn’t Benefit Europe
After years of tensions, tariffs, mutual accusations, and trade wars that have shattered the global balance of power, the long-awaited meeting between Donald Trump and Xi Jinping has finally taken pla...
Cloud yes or Cloud no: When the Digital Sky Darkens
The outage of Microsoft’s cloud services, which occurred just hours before the release of its quarterly results, is just the latest in a long series of outages that are exposing a structural vul...
US builds largest AI supercomputer in history
The U.S. Department of Energy (DOE) has entered into a strategic collaboration with Nvidia and Oracle to build seven next-generation AI-powered supercomputers , set to revolutionize scientific researc...
Microsoft 365 goes down: DNS anomaly paralyzes services worldwide
A DNS service outage was detected by Microsoft on October 29, 2025, impacting access to critical services such as Microsoft Azure and Microsoft 365. An anomaly was detected at 21:37 GMT+5:30, causing ...
Tor Browser Says No to Artificial Intelligence! Security Comes First
Interestingly, while major companies like Microsoft and Google are actively adding AI features to their browsers, the Tor development team has chosen to remove them. @henry, a Tor project contributor,...
Tasting the Exploit: HackerHood tests Microsoft WSUS CVE-2025-59287 Exploit
The cybersecurity landscape was recently rocked by the discovery of a critical Remote Code Execution (RCE) vulnerability in Microsoft’s Windows Server Update Services (WSUS) . Identified as CVE-2025-5...
ChatGPT Atlas: Researchers Discover How a Link Can Lead to Jailbreak
NeuralTrust researchers have discovered a vulnerability in OpenAI’s ChatGPT Atlas browser. This time, the attack vector is linked to the omnibox, the bar where users enter URLs or search queries...
Malware alert: Critical WordPress plugin vulnerabilities actively exploited
Wordfence is raising the alarm about a large-scale malware campaign in which attackers are exploiting critical vulnerabilities in the popular WordPress plugins GutenKit and Hunk Companion . The compan...
Gemini 3.0 Pro: What people who are trying it say
In recent days, a select few users have reported having access to the new Gemini 3.0 Pro model. Initial impressions suggest a significant improvement over the previous generation, so much so that many...
China promotes global AI governance under the United Nations
On October 27, the Blue Hall Forum on the theme of “Improving Global Governance and Building a Community with a Shared Future for Humanity” was held at the Ministry of Foreign Affairs in B...
Featured Articles

After years of tensions, tariffs, mutual accusations, and trade wars that have shattered the global balance of power, the long-awaited meeting between Donald Trump and Xi Jinping has finally taken pla...

The outage of Microsoft’s cloud services, which occurred just hours before the release of its quarterly results, is just the latest in a long series of outages that are exposing a structural vul...

The U.S. Department of Energy (DOE) has entered into a strategic collaboration with Nvidia and Oracle to build seven next-generation AI-powered supercomputers , set to revolutionize scientific researc...

A DNS service outage was detected by Microsoft on October 29, 2025, impacting access to critical services such as Microsoft Azure and Microsoft 365. An anomaly was detected at 21:37 GMT+5:30, causing ...

Interestingly, while major companies like Microsoft and Google are actively adding AI features to their browsers, the Tor development team has chosen to remove them. @henry, a Tor project contributor,...
If you get an email saying you’re dead… it’s the new LastPass phishing scam
Vulnerable POS: Investigation into the hardware security of payment devices
ChatGPT Atlas: Researchers Discover How a Link Can Lead to Jailbreak
Malware alert: Critical WordPress plugin vulnerabilities actively exploited
ClayRat: The spyware that targets Android users with self-propagation
Be careful what you tell AI! It could be confidential data

If you get an email saying you’re dead… it’s the new LastPass phishing scam
Redazione RHC - October 29th, 2025
The developers of password manager LastPass have warned users of a large-scale phishing campaign that began in mid-October 2025. Attackers are sending emails containing fake requests for emergency access to...

Vulnerable POS: Investigation into the hardware security of payment devices
Redazione RHC - October 29th, 2025
Worldline payment terminals, widely used in Switzerland, have been exposed to an attack that allows anyone to gain complete control of the device in just a minute . The vulnerability...

ChatGPT Atlas: Researchers Discover How a Link Can Lead to Jailbreak
Redazione RHC - October 29th, 2025
NeuralTrust researchers have discovered a vulnerability in OpenAI's ChatGPT Atlas browser. This time, the attack vector is linked to the omnibox, the bar where users enter URLs or search queries....

Malware alert: Critical WordPress plugin vulnerabilities actively exploited
Redazione RHC - October 29th, 2025
Wordfence is raising the alarm about a large-scale malware campaign in which attackers are exploiting critical vulnerabilities in the popular WordPress plugins GutenKit and Hunk Companion . The company blocked...

ClayRat: The spyware that targets Android users with self-propagation
Redazione RHC - October 29th, 2025
The ClayRat spyware campaign is expanding rapidly and increasingly targeting Android users. According to Zimperium, the malware is actively spreading among Russian users through fake websites and Telegram channels, masquerading...

Be careful what you tell AI! It could be confidential data
Filippo Boni - October 29th, 2025
In an age where every question is answered with a simple tap, we users have perhaps gotten a little too comfortable with the new AI-based assistants. Ultimately, it makes little...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

