Red Hot Cyber. The Cybersecurity Blog
Featured Articles

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

Anthropic has released Claude Opus 4.5 , its new flagship model, which the company says is the most powerful version yet and ranks at the top of the class for practical programming, agent-based produc...

On November 24, Alibaba announced Qwen3Max, which had been in public beta for a week , and had already surpassed 10 million downloads. It was a record that shattered all others. In a very short time, ...

Remote work has given employees freedom , but with it has also come digital surveillance . We discussed this some time ago in an article, reporting that these monitoring tools are also coming to Micro...

On November 13, Eurofiber France, a respected provider of fiber optic network and VPN solutions to many of France’s leading companies, discovered that its systems had been compromised by criminal ha...
DAS: The world’s ear hidden in submarine cables
Hacker culture pioneer Peter Samson plays “Boards of Canada” on PDP-1
Crimson Collective claims alleged Nintendo hack: bluff or real breach?
Critical vulnerabilities in Microsoft Defender for Endpoint: security risks
Between AI and fear, Skynet teaches: “We’ll build bunkers before launching AGI.”
GitHub is migrating to Azure! And goodbye to new development for a year.

DAS: The world’s ear hidden in submarine cables
Redazione RHC - October 13th, 2025
Over 1.2 million kilometers of fiber optic cables lie on the ocean floor, long considered solely part of a global telecommunications network. However, distributed acoustic sensing (DAS) technology , rapidly...

Hacker culture pioneer Peter Samson plays “Boards of Canada” on PDP-1
Redazione RHC - October 12th, 2025
In a world where music has long since migrated to streaming and digital platforms, one enthusiast decided to go back six decades, to a time when melodies could still come...

Crimson Collective claims alleged Nintendo hack: bluff or real breach?
Luca Galuppi - October 12th, 2025
This time, hackers are targeting Nintendo , the historic Japanese video game company that has been tooth and nail for decades defending its intellectual property and the industrial secrets that...

Critical vulnerabilities in Microsoft Defender for Endpoint: security risks
Redazione RHC - October 12th, 2025
Security flaws have been discovered in network communication between Microsoft Defender for Endpoint (DFE) cloud services , allowing attackers, following a breach, to bypass authentication, manipulate data, release sensitive information,...

Between AI and fear, Skynet teaches: “We’ll build bunkers before launching AGI.”
Redazione RHC - October 12th, 2025
The quote, “We’ll definitely build a bunker before we launch AGI,” that inspired the article, was attributed to a Silicon Valley leader, though it’s unclear who exactly he meant by...

GitHub is migrating to Azure! And goodbye to new development for a year.
Redazione RHC - October 12th, 2025
When Microsoft acquired GitHub in 2018, the company tried to stay away. The platform developed relatively independently until things began to change in recent months. The departure of GitHub CEO...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

