Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Anthropic has released Claude Opus 4.5 , its new flagship model, which the company says is the most powerful version yet and ranks at the top of the class for practical programming, agent-based produc...

On November 24, Alibaba announced Qwen3Max, which had been in public beta for a week , and had already surpassed 10 million downloads. It was a record that shattered all others. In a very short time, ...

Remote work has given employees freedom , but with it has also come digital surveillance . We discussed this some time ago in an article, reporting that these monitoring tools are also coming to Micro...

On November 13, Eurofiber France, a respected provider of fiber optic network and VPN solutions to many of France’s leading companies, discovered that its systems had been compromised by criminal ha...

This fall, we’ve had quite a bit of a cloud headache, I don’t know if you’ve noticed. That is, AWS, Azure , and then Cloudflare . All of them down, one after the other. A series of outages that ...
Australia: Microsoft accused of deceptive practices in Microsoft 365 renewals
Criminal Hackers Breach US Nuclear Weapons Production Facilities
The secret behind Space Invaders’ speed? A technical limitation of the hardware
$2.8 billion in cryptocurrency stolen! Here’s how North Korea circumvents UN sanctions.
CoPhish is coming! Microsoft Copilot Studio used to steal accounts
Anatomy of a Data Theft: Technical Analysis of the “Formbook” Infostealer

Australia: Microsoft accused of deceptive practices in Microsoft 365 renewals
Redazione RHC - October 27th, 2025
Australia's competition watchdog, the ACCC, said subscribers to Microsoft 365 Personal and Family plans were being asked to pay higher prices for Copilot or cancel their subscriptions. According to the...

Criminal Hackers Breach US Nuclear Weapons Production Facilities
Redazione RHC - October 27th, 2025
Government hackers breached a nuclear weapons component manufacturing facility in the United States by exploiting vulnerabilities in Microsoft SharePoint. The incident affected the Kansas City National Security Campus (KCNSC) ,...

The secret behind Space Invaders’ speed? A technical limitation of the hardware
Redazione RHC - October 27th, 2025
In 1978, Taito's Space Invaders captivated audiences with its seemingly ingenious gameplay: the more aliens you shot down, the faster the remaining ones moved. A crescendo of tension that marked...

$2.8 billion in cryptocurrency stolen! Here’s how North Korea circumvents UN sanctions.
Redazione RHC - October 27th, 2025
Member countries of the international monitoring group MSMT have concluded that North Korea is increasing its use of cybercrime and the remote work of its citizens abroad to circumvent international...

CoPhish is coming! Microsoft Copilot Studio used to steal accounts
Redazione RHC - October 27th, 2025
Attackers are using an advanced phishing technique, known as CoPhish, that leverages Microsoft Copilot Studio to trick users into granting unauthorized access to their Microsoft Sign In ID accounts. A...

Anatomy of a Data Theft: Technical Analysis of the “Formbook” Infostealer
Redazione RHC - October 27th, 2025
In the cyber threat landscape, few malware programs are as persistent and widespread as Formbook . What began as a simple keylogger and form grabber has evolved into a powerful...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

