Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
UtiliaCS 320x100
970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Anthropic Releases Claude Opus 4.5: AI Model for Enhanced Productivity
Di Redazione RHC - 24/11/2025

Anthropic has released Claude Opus 4.5 , its new flagship model, which the company says is the most powerful version yet and ranks at the top of the class for practical programming, agent-based produc...

Immagine del sito
Alibaba Qwen3Max Dominates AI Market with Rapid Growth
Di Redazione RHC - 24/11/2025

On November 24, Alibaba announced Qwen3Max, which had been in public beta for a week , and had already surpassed 10 million downloads. It was a record that shattered all others. In a very short time, ...

Immagine del sito
Digital Surveillance at Work: The Rise of Algorithmic Monitoring
Di Redazione RHC - 24/11/2025

Remote work has given employees freedom , but with it has also come digital surveillance . We discussed this some time ago in an article, reporting that these monitoring tools are also coming to Micro...

Immagine del sito
Cyberattack on Eurofiber France: Find out what happened
Di Redazione RHC - 24/11/2025

On November 13, Eurofiber France, a respected provider of fiber optic network and VPN solutions to many of France’s leading companies, discovered that its systems had been compromised by criminal ha...

Immagine del sito
When the Cloud Falls: How a Small Mistake Brought the Global Internet to Its Knees
Di Gaia Russo - 24/11/2025

This fall, we’ve had quite a bit of a cloud headache, I don’t know if you’ve noticed. That is, AWS, Azure , and then Cloudflare . All of them down, one after the other. A series of outages that ...

Artificial General Intelligence (AGI): the first global standard for measuring it has been defined

On October 21, 2025, an international team of researchers from 29 leading institutions—including Stanford University, MIT, and the University of Calif...
Redazione RHC - 23/10/2025 - 20:59

$2.5 billion: The cost of the Jaguar Land Rover cyber attack.

Jaguar Land Rover continues to deal with the fallout from the cyber attack that paralyzed production, disrupted its dealer network, and jeopardized su...
Redazione RHC - 23/10/2025 - 18:35

Court orders NSO Group to stop using spyware against WhatsApp

A federal court has ordered Israeli company NSO Group (developer of the commercial spyware Pegasus) to stop using spyware to target and attack WhatsAp...
Redazione RHC - 23/10/2025 - 16:47

A serious bug in Microsoft 365 Copilot leads to data exfiltration via prompts

An advanced security flaw exists in M365 Copilot that allows attackers to exfiltrate sensitive information from tenants, such as recent emails, throug...
Redazione RHC - 23/10/2025 - 13:30

Russia legalizes white hat hackers with new law

Russia is preparing a new version of a bill legalizing white hat hackers . Two sources in government agencies and the cybersecurity industry told RBC ...
Redazione RHC - 23/10/2025 - 12:05

Azure under attack: Fake apps imitating Microsoft Teams and Azure Portal

A new wave of digital deception has hit the Microsoft Azure ecosystem, where newly discovered vulnerabilities have allowed cybercriminals to create ma...
Luca Galuppi - 23/10/2025 - 07:15
1 51 52 53 54 55 253

Artificial General Intelligence (AGI): the first global standard for measuring it has been defined

- October 23rd, 2025

On October 21, 2025, an international team of researchers from 29 leading institutions—including Stanford University, MIT, and the University of California, Berkeley —completed a study that marks a milestone in...

Facebook Linkedin X

$2.5 billion: The cost of the Jaguar Land Rover cyber attack.

- October 23rd, 2025

Jaguar Land Rover continues to deal with the fallout from the cyber attack that paralyzed production, disrupted its dealer network, and jeopardized supply chains. Vehicle production at major UK plants...

Facebook Linkedin X

Court orders NSO Group to stop using spyware against WhatsApp

- October 23rd, 2025

A federal court has ordered Israeli company NSO Group (developer of the commercial spyware Pegasus) to stop using spyware to target and attack WhatsApp users. Please note that Pegasus is...

Facebook Linkedin X

A serious bug in Microsoft 365 Copilot leads to data exfiltration via prompts

- October 23rd, 2025

An advanced security flaw exists in M365 Copilot that allows attackers to exfiltrate sensitive information from tenants, such as recent emails, through indirect command injection. Security researcher Adam Logue detailed...

Facebook Linkedin X

Russia legalizes white hat hackers with new law

- October 23rd, 2025

Russia is preparing a new version of a bill legalizing white hat hackers . Two sources in government agencies and the cybersecurity industry told RBC that the document has already...

Facebook Linkedin X

Azure under attack: Fake apps imitating Microsoft Teams and Azure Portal

- October 23rd, 2025

A new wave of digital deception has hit the Microsoft Azure ecosystem, where newly discovered vulnerabilities have allowed cybercriminals to create malicious apps that perfectly mimic official services like Microsoft...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE