Red Hot Cyber. The Cybersecurity Blog
Featured Articles

According to computer forensics expert Elom Daniel, WhatsApp messages can contain hidden geolocation data even when the user hasn’t intentionally shared their location. He claimed to have received a...

Until now, ChatGPT has been ad-free: no banners, no hidden promotions. Even the paid versions worked without pushy offers. But that could change soon. As reported by user X (formerly of Twitter) under...

The Russian Federation’s Roskomnadzor has announced that it continues to impose systematic restrictions on the messaging app WhatsApp due to violations of Russian law. According to the agency, the s...

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Anthropic Releases Claude Opus 4.5: AI Model for Enhanced Productivity
Alibaba Qwen3Max Dominates AI Market with Rapid Growth
Digital Surveillance at Work: The Rise of Algorithmic Monitoring
Windows Server Vulnerability Exploited: ShadowPad Malware Deployed
Salesforce Data Breach: ShinyHunters Hack Gainsight Integration

The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Redazione RHC - November 24th, 2025
On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app....

Anthropic Releases Claude Opus 4.5: AI Model for Enhanced Productivity
Redazione RHC - November 23rd, 2025
Anthropic has released Claude Opus 4.5 , its new flagship model, which the company says is the most powerful version yet and ranks at the top of the class for...

Alibaba Qwen3Max Dominates AI Market with Rapid Growth
Redazione RHC - November 23rd, 2025
On November 24, Alibaba announced Qwen3Max, which had been in public beta for a week , and had already surpassed 10 million downloads. It was a record that shattered all...

Digital Surveillance at Work: The Rise of Algorithmic Monitoring
Redazione RHC - November 23rd, 2025
Remote work has given employees freedom , but with it has also come digital surveillance . We discussed this some time ago in an article, reporting that these monitoring tools...

Windows Server Vulnerability Exploited: ShadowPad Malware Deployed
Redazione RHC - November 23rd, 2025
A recently patched vulnerability in Microsoft’s Windows Server update services has led to a series of attacks using one of the most notorious espionage tools of recent years. The incidents...

Salesforce Data Breach: ShinyHunters Hack Gainsight Integration
Redazione RHC - November 23rd, 2025
The growing data leak from the Salesforce ecosystem has taken a new turn after the ShinyHunters group announced its involvement in the incident. The incident has been ongoing for several...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

