Red Hot Cyber. The Cybersecurity Blog
Featured Articles

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

Anthropic has released Claude Opus 4.5 , its new flagship model, which the company says is the most powerful version yet and ranks at the top of the class for practical programming, agent-based produc...

On November 24, Alibaba announced Qwen3Max, which had been in public beta for a week , and had already surpassed 10 million downloads. It was a record that shattered all others. In a very short time, ...

Remote work has given employees freedom , but with it has also come digital surveillance . We discussed this some time ago in an article, reporting that these monitoring tools are also coming to Micro...

On November 13, Eurofiber France, a respected provider of fiber optic network and VPN solutions to many of France’s leading companies, discovered that its systems had been compromised by criminal ha...
AI Alignment: Where Does AI Learn Right and Wrong?
Microsoft Patch Tuesday: 175 vulnerabilities fixed and two zero-days exploited
Microsoft warns about uncontrolled use of ‘shadow’ AI in the workplace
12 security bugs discovered in Ivanti Endpoint Manager (EPM). Update now!
A PNG containing a Trojan. Astaroth persistently abuses GitHub.
Satellites targeted! Thousands of phone conversations and text messages intercepted.

AI Alignment: Where Does AI Learn Right and Wrong?
Sergio Corpettini - October 14th, 2025
The other day on LinkedIn, I found myself having a conversation with someone who was seriously interested in the topic of artificial intelligence applied to law. It wasn't one of...

Microsoft Patch Tuesday: 175 vulnerabilities fixed and two zero-days exploited
Redazione RHC - October 14th, 2025
In its latest update, the tech giant fixed 175 vulnerabilities affecting its core products and underlying systems, including two actively exploited zero-day vulnerabilities , the company said in its latest...

Microsoft warns about uncontrolled use of ‘shadow’ AI in the workplace
Redazione RHC - October 14th, 2025
While Microsoft actively promotes its Copilot tools for businesses, the company also warns of the dangers of uncontrolled use of "shadow" AI by employees. A new report raises the alarm...

12 security bugs discovered in Ivanti Endpoint Manager (EPM). Update now!
Redazione RHC - October 14th, 2025
Ivanti has published 13 vulnerabilities in its Endpoint Manager (EPM) software , including two high-severity flaws that could allow remote code execution and privilege escalation . Despite the lack of...

A PNG containing a Trojan. Astaroth persistently abuses GitHub.
Redazione RHC - October 14th, 2025
McAfee researchers have reported new activity by the Astaroth banking trojan , which has started using GitHub as a persistent channel for distributing configuration data. This approach allows attackers to...

Satellites targeted! Thousands of phone conversations and text messages intercepted.
Redazione RHC - October 14th, 2025
Satellite communications links used by government agencies, the military, businesses, and mobile operators have been discovered to be the source of a massive data leak. Researchers at the University of...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

