Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Crowdstrike 320×100
Banner Desktop

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

Immagine del sito
Anthropic Releases Claude Opus 4.5: AI Model for Enhanced Productivity
Di Redazione RHC - 24/11/2025

Anthropic has released Claude Opus 4.5 , its new flagship model, which the company says is the most powerful version yet and ranks at the top of the class for practical programming, agent-based produc...

Immagine del sito
Alibaba Qwen3Max Dominates AI Market with Rapid Growth
Di Redazione RHC - 24/11/2025

On November 24, Alibaba announced Qwen3Max, which had been in public beta for a week , and had already surpassed 10 million downloads. It was a record that shattered all others. In a very short time, ...

Immagine del sito
Digital Surveillance at Work: The Rise of Algorithmic Monitoring
Di Redazione RHC - 24/11/2025

Remote work has given employees freedom , but with it has also come digital surveillance . We discussed this some time ago in an article, reporting that these monitoring tools are also coming to Micro...

Immagine del sito
Cyberattack on Eurofiber France: Find out what happened
Di Redazione RHC - 24/11/2025

On November 13, Eurofiber France, a respected provider of fiber optic network and VPN solutions to many of France’s leading companies, discovered that its systems had been compromised by criminal ha...

40,000 iPhones stolen and shipped to Asia: London police arrest international gang

London police announced that Operation Echosteep has uncovered and dismantled a gang responsible for mass iPhone thefts. Investigators estimate the gr...
Redazione RHC - 10/10/2025 - 09:55

Tetris: The game that challenges the limits of modern supercomputers

First released in 1984 by Russian programmer Alexey Pajitnov , Tetris quickly became a global phenomenon. Born as digital entertainment, the puzzle ga...
Redazione RHC - 10/10/2025 - 09:08

Oracle E-Business Suite Zero-Day Attack: Clop Exploits CVE-2025-61882

Last week, Oracle warned customers of a critical zero-day vulnerability in its E-Business Suite (CVE-2025-61882), which allows remote execution of arb...
Redazione RHC - 10/10/2025 - 08:02

I Want It All! ChatGPT Ready to Become an Operating System

When Nick Turley joined OpenAI in 2022 to lead the ChatGPT team, he was tasked with transforming enterprise research into a commercial product. He has...
Redazione RHC - 10/10/2025 - 07:26

Italian ethical hackers top the podium at the European Cybersecurity Challenge 2025.

From 6 to 9 October 2025, Warsaw hosted the 11th edition of the European Cybersecurity Challenge (ECSC) . In a close competition among 39 teams from E...
Redazione RHC - 09/10/2025 - 17:55

1,000 POS terminals from US and UK stores hacked and put up for auction: “full access” for $55,000

A new ad posted on an underground forum was recently spotted by researchers at the Dark Lab threat intelligence laboratory , clearly demonstrating how...
Redazione RHC - 09/10/2025 - 16:39
1 73 74 75 76 77 254

40,000 iPhones stolen and shipped to Asia: London police arrest international gang

- October 10th, 2025

London police announced that Operation Echosteep has uncovered and dismantled a gang responsible for mass iPhone thefts. Investigators estimate the group is responsible for 40% of all phone thefts in...

Facebook Linkedin X

Tetris: The game that challenges the limits of modern supercomputers

- October 10th, 2025

First released in 1984 by Russian programmer Alexey Pajitnov , Tetris quickly became a global phenomenon. Born as digital entertainment, the puzzle game has captivated hundreds of millions of people...

Facebook Linkedin X

Oracle E-Business Suite Zero-Day Attack: Clop Exploits CVE-2025-61882

- October 10th, 2025

Last week, Oracle warned customers of a critical zero-day vulnerability in its E-Business Suite (CVE-2025-61882), which allows remote execution of arbitrary code without authentication. It has now been revealed that...

Facebook Linkedin X

I Want It All! ChatGPT Ready to Become an Operating System

- October 10th, 2025

When Nick Turley joined OpenAI in 2022 to lead the ChatGPT team, he was tasked with transforming enterprise research into a commercial product. He has accomplished this mission remarkably well:...

Facebook Linkedin X

Italian ethical hackers top the podium at the European Cybersecurity Challenge 2025.

- October 9th, 2025

From 6 to 9 October 2025, Warsaw hosted the 11th edition of the European Cybersecurity Challenge (ECSC) . In a close competition among 39 teams from EU member states, EFTA...

Facebook Linkedin X

1,000 POS terminals from US and UK stores hacked and put up for auction: “full access” for $55,000

- October 9th, 2025

A new ad posted on an underground forum was recently spotted by researchers at the Dark Lab threat intelligence laboratory , clearly demonstrating how active and dangerous the black market...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE