Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Anthropic has released Claude Opus 4.5 , its new flagship model, which the company says is the most powerful version yet and ranks at the top of the class for practical programming, agent-based produc...

On November 24, Alibaba announced Qwen3Max, which had been in public beta for a week , and had already surpassed 10 million downloads. It was a record that shattered all others. In a very short time, ...

Remote work has given employees freedom , but with it has also come digital surveillance . We discussed this some time ago in an article, reporting that these monitoring tools are also coming to Micro...

On November 13, Eurofiber France, a respected provider of fiber optic network and VPN solutions to many of France’s leading companies, discovered that its systems had been compromised by criminal ha...

This fall, we’ve had quite a bit of a cloud headache, I don’t know if you’ve noticed. That is, AWS, Azure , and then Cloudflare . All of them down, one after the other. A series of outages that ...
Artificial General Intelligence (AGI): the first global standard for measuring it has been defined
$2.5 billion: The cost of the Jaguar Land Rover cyber attack.
Court orders NSO Group to stop using spyware against WhatsApp
A serious bug in Microsoft 365 Copilot leads to data exfiltration via prompts
Russia legalizes white hat hackers with new law
Azure under attack: Fake apps imitating Microsoft Teams and Azure Portal

Artificial General Intelligence (AGI): the first global standard for measuring it has been defined
Redazione RHC - October 23rd, 2025
On October 21, 2025, an international team of researchers from 29 leading institutions—including Stanford University, MIT, and the University of California, Berkeley —completed a study that marks a milestone in...

$2.5 billion: The cost of the Jaguar Land Rover cyber attack.
Redazione RHC - October 23rd, 2025
Jaguar Land Rover continues to deal with the fallout from the cyber attack that paralyzed production, disrupted its dealer network, and jeopardized supply chains. Vehicle production at major UK plants...

Court orders NSO Group to stop using spyware against WhatsApp
Redazione RHC - October 23rd, 2025
A federal court has ordered Israeli company NSO Group (developer of the commercial spyware Pegasus) to stop using spyware to target and attack WhatsApp users. Please note that Pegasus is...

A serious bug in Microsoft 365 Copilot leads to data exfiltration via prompts
Redazione RHC - October 23rd, 2025
An advanced security flaw exists in M365 Copilot that allows attackers to exfiltrate sensitive information from tenants, such as recent emails, through indirect command injection. Security researcher Adam Logue detailed...

Russia legalizes white hat hackers with new law
Redazione RHC - October 23rd, 2025
Russia is preparing a new version of a bill legalizing white hat hackers . Two sources in government agencies and the cybersecurity industry told RBC that the document has already...

Azure under attack: Fake apps imitating Microsoft Teams and Azure Portal
Luca Galuppi - October 23rd, 2025
A new wave of digital deception has hit the Microsoft Azure ecosystem, where newly discovered vulnerabilities have allowed cybercriminals to create malicious apps that perfectly mimic official services like Microsoft...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

