Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Cyber Offensive Fundamentals 320x200 V0.1
Banner Desktop

Author: Redazione RHC

Redazione RHC

The Red Hot Cyber Editorial Team provides daily updates on bugs, data breaches, and global threats. Every piece of content is validated by our community of experts, including Pietro Melillo, Massimiliano Brolli, Sandro Sana, Olivia Terragni, and Stefano Gazzella.

Through synergy with our industry-leading partners—such as Accenture, CrowdStrike, Trend Micro, and Fortinet—we transform technical complexity into collective awareness. We ensure information accuracy by analyzing primary sources and maintaining a rigorous technical peer-review process.

Leonardo’s Michelangelo Dome: AI-Powered Defense Against Hypersonic Threats

Italian defense company Leonardo has unveiled its new Michelangelo Dome system . According to the company, it is designed to counter hypersonic missiles and mass drone attacks . During the...
Share on Facebook Share on LinkedIn Share on X

Windows 11 Password Issue: Microsoft Warns of Invisible Icon Bug

Microsoft has warned users of a Windows 11 glitch: after the release of updates starting in August 2025 , the password-based sign-in button may disappear from the lock screen. While...
Share on Facebook Share on LinkedIn Share on X

CISA Warns of OpenPLC ScadaBR Vulnerability Exploitation

The Cybersecurity and Infrastructure Security Agency (CISA) has expanded its list of exploited vulnerabilities (KEVs), reporting a new vulnerability affecting OpenPLC ScadaBR , due to ongoing active exploitation indications. This...
Share on Facebook Share on LinkedIn Share on X

The Power of A* Algorithm in Artificial Intelligence and Robotics

Nearly everything artificial intelligence does today is based on a simple but fundamental idea: any problem can be reduced to finding a path from a starting point to a goal....
Share on Facebook Share on LinkedIn Share on X

WhatsApp Messages Contain Hidden GPS Data, Expert Warns

According to computer forensics expert Elom Daniel, WhatsApp messages can contain hidden geolocation data even when the user hasn't intentionally shared their location. He claimed to have received a routine...
Share on Facebook Share on LinkedIn Share on X

DeepSeekMath-V2 Revolutionizes Math with AI-Powered Proof Verification

The Chinese company DeepSeek has introduced a new specialized model for solving mathematical problems , DeepSeekMath-V2. This large-scale language model, specifically designed for theorem proving and Olympiad problems, is unique...
Share on Facebook Share on LinkedIn Share on X

Shai-Hulud Attack: npm Supply Chain Compromised Again

The npm ecosystem is once again at the center of a large-scale supply chain attack attributed to the Shai-Hulud campaign. This wave has led to the release of hundreds of...
Share on Facebook Share on LinkedIn Share on X

ChatGPT to Introduce Targeted Ads, Changing Monetization Strategy

Until now, ChatGPT has been ad-free: no banners, no hidden promotions. Even the paid versions worked without pushy offers. But that could change soon. As reported by user X (formerly...
Share on Facebook Share on LinkedIn Share on X

GitLab Security Updates Fix High-Severity Vulnerabilities CVE-2024-9183

GitLab has released critical security updates for its Community Edition (CE) and Enterprise Edition (EE) to address several high-severity vulnerabilities . The newly released patches 18.6.1, 18.5.3, and 18.4.5 address...
Share on Facebook Share on LinkedIn Share on X

Apache SkyWalking Vulnerability Exposes Users to XSS Attacks

A vulnerability was recently discovered in Apache SkyWalking , a popular application performance monitoring tool, that attackers could exploit to execute malicious scripts and launch cross-site scripting (XSS) attacks ....
Share on Facebook Share on LinkedIn Share on X