Red Hot Cyber. The Cybersecurity Blog
Featured Articles

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

Anthropic has released Claude Opus 4.5 , its new flagship model, which the company says is the most powerful version yet and ranks at the top of the class for practical programming, agent-based produc...

On November 24, Alibaba announced Qwen3Max, which had been in public beta for a week , and had already surpassed 10 million downloads. It was a record that shattered all others. In a very short time, ...

Remote work has given employees freedom , but with it has also come digital surveillance . We discussed this some time ago in an article, reporting that these monitoring tools are also coming to Micro...

On November 13, Eurofiber France, a respected provider of fiber optic network and VPN solutions to many of France’s leading companies, discovered that its systems had been compromised by criminal ha...
40,000 iPhones stolen and shipped to Asia: London police arrest international gang
Tetris: The game that challenges the limits of modern supercomputers
Oracle E-Business Suite Zero-Day Attack: Clop Exploits CVE-2025-61882
I Want It All! ChatGPT Ready to Become an Operating System
Italian ethical hackers top the podium at the European Cybersecurity Challenge 2025.
1,000 POS terminals from US and UK stores hacked and put up for auction: “full access” for $55,000

40,000 iPhones stolen and shipped to Asia: London police arrest international gang
Redazione RHC - October 10th, 2025
London police announced that Operation Echosteep has uncovered and dismantled a gang responsible for mass iPhone thefts. Investigators estimate the group is responsible for 40% of all phone thefts in...

Tetris: The game that challenges the limits of modern supercomputers
Redazione RHC - October 10th, 2025
First released in 1984 by Russian programmer Alexey Pajitnov , Tetris quickly became a global phenomenon. Born as digital entertainment, the puzzle game has captivated hundreds of millions of people...

Oracle E-Business Suite Zero-Day Attack: Clop Exploits CVE-2025-61882
Redazione RHC - October 10th, 2025
Last week, Oracle warned customers of a critical zero-day vulnerability in its E-Business Suite (CVE-2025-61882), which allows remote execution of arbitrary code without authentication. It has now been revealed that...

I Want It All! ChatGPT Ready to Become an Operating System
Redazione RHC - October 10th, 2025
When Nick Turley joined OpenAI in 2022 to lead the ChatGPT team, he was tasked with transforming enterprise research into a commercial product. He has accomplished this mission remarkably well:...

Italian ethical hackers top the podium at the European Cybersecurity Challenge 2025.
Redazione RHC - October 9th, 2025
From 6 to 9 October 2025, Warsaw hosted the 11th edition of the European Cybersecurity Challenge (ECSC) . In a close competition among 39 teams from EU member states, EFTA...

1,000 POS terminals from US and UK stores hacked and put up for auction: “full access” for $55,000
Redazione RHC - October 9th, 2025
A new ad posted on an underground forum was recently spotted by researchers at the Dark Lab threat intelligence laboratory , clearly demonstrating how active and dangerous the black market...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

