Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Enterprise BusinessLog 320x200 1
Fortinet 970x120px

Tag: artificial intelligence

WormGPT 4: AI-Powered Cybercrime Tools on the Rise

Cybercriminals no longer need to convince ChatGPT or Claude Code to write malware or data-stealing scripts. A whole class of specialized language models, specifically designed for attacks, already exists. One such system is WormGPT 4, which advertises itself as “the key to borderless artificial intelligence .” It carries on the legacy of the original WormGPT model, which emerged in 2023 and subsequently disappeared due to the rise of other ” toxic ” LLMs, as highlighted in the Abnormal Security study . According to experts at Unit 42 at Palo Alto Networks, sales of WormGPT 4 began around September 27, with advertisements appearing

Trump Launches Genesis AI Mission to Revolutionize US Science

US President Donald Trump signed an executive order, ” Launching the Genesis Mission,” establishing a national program for the use of artificial intelligence in science. The document was published on the White House website . The preamble compares the initiative to the Manhattan Project in scope and urgency and promises ” a new era of scientific discovery accelerated by artificial intelligence.” According to Politico , presidential science adviser Michael Kratsios calls the Genesis Mission ” the largest mobilization of federal scientific resources since the Apollo program .” U.S. Secretary of Energy Chris Wright, an entrepreneur who made his fortune in fracking ,

Cybersecurity in the Middle East: Egitto and Qatar Lead the Way

Global attention to cybersecurity continues to grow in a context dominated by digital transformation and the rapid spread of artificial intelligence (AI) technologies, making it easier to identify vulnerabilities and conduct complex attacks. In this context, a country’s ability to ensure protection, coordination, training, and international cooperation has become a key indicator of national stability. In the 2024 Global Cybersecurity Index, Egypt and Qatar achieved a maximum score of 100, placing them among the 12 highest-performing countries globally. This result was achieved thanks to compliance with the index’s five pillars: legislative framework, technical protection, organizational structure, capacity development programs, and international collaboration

The Future of Tech: How to Navigate the Digital World

There are books that explain technology and books that make you understand why you should pause for a minute before scrolling through a feed. Il Futuro Prossimo , Sandro Sana ‘s new work, available on Amazon , belongs to the second category: it doesn’t pretend to educate you, it pretends to make you think. And it does so without technicalities, without barriers, and without that distance that information technology often creates between the writer and the reader. Sandro Sana is a well-known figure in the world of Italian cybersecurity (CISO and director of the Cyber division of Eurosystem , teacher, communicator, member

Anthropic Releases Claude Opus 4.5: AI Model for Enhanced Productivity

Anthropic has released Claude Opus 4.5 , its new flagship model, which the company says is the most powerful version yet and ranks at the top of the class for practical programming, agent-based productivity scenarios. The model has also seen significant improvements in in-depth search, analytics, and presentation capabilities. Opus 4.5 is now available via apps, APIs, and across all three major cloud technologies. SOTA in real engineering In the SWE-bench Verified test, the new model shows the best result among all frontier models : Anthropic particularly emphasizes that Opus 4.5 represents a significant step forward compared to Sonnet 4.5, overcoming tasks

Alibaba Qwen3Max Dominates AI Market with Rapid Growth

On November 24, Alibaba announced Qwen3Max, which had been in public beta for a week , and had already surpassed 10 million downloads. It was a record that shattered all others. In a very short time, it had overshadowed ChatGPT, Sora , and even DeepSeek , becoming the fastest-growing AI application ever seen. It was Alibaba’s second China move in 2025 , after DeepSeek had already shaken up the industry earlier this year. The Chinese giant’s shares rose 4.13% in Hong Kong. No overly pompous official announcements, no flashy livestream events: just numbers that spoke for themselves. And the markets, as usual,

Digital Surveillance at Work: The Rise of Algorithmic Monitoring

Remote work has given employees freedom , but with it has also come digital surveillance . We discussed this some time ago in an article, reporting that these monitoring tools are also coming to Microsoft Teams. Therefore, instead of the boss’s unwavering gaze, this role will increasingly be played by ” algorithms ” that monitor how long applications are open, which websites are visited, and how actively the mouse is moved and keys pressed. Advanced systems even analyze employees’ facial expressions and the way they walk in front of a webcam. But these tools also highlight the inherent limitations of collecting personal

Pope warns: “AI is not the devil, but it can become one without ethics”

The head of the Catholic Churchhas expressed concern about the way today’s children and adolescents interact with digital technologies. In his viewthe abundance of information available through neural networks and other intelligent systems can seriously affect the mental and intellectual development of the younger generations. Pope Leo XIV has warned of the risks thatthe rapid development of artificial intelligence could pose to young people. He expressed his position at the Second Annual Rome Conference on AI, part of which is being held in the Vatican. At the same time, the Pontiff noted that artificial intelligence in itself does not pose a threat. It can be

“Jailbreak as a Service” is Coming: 60 Euros a Month to Purchase Cybercrime-Ready AI Systems

According to a report by Cato Networks, cybercriminals continue to actively use LLM patterns in their attacks. Specifically, we are talking about versions of theGrok and Mixtral patterns that have been deliberately modified to bypass built-in restrictions and generate malicious content. Apparently, one such modified version of Grok appeared on the popular forum BreachForums in February 2025. It was posted by a user with the pseudonym Keanu. The tool is a wrapper around the original Grok model and is controlled via a specially written system prompt. This is how the authors ensure that the model bypasses protection mechanisms and generates phishing emails, malicious code, and hacking instructions. A

Bringing Your Imagination to Life: AI-Generated Images from Your Description

Remember when you had a vivid image in your mind but struggled to describe it to someone else? Maybe it was a character from a dream, a breathtaking landscape, or a unique design you wished existed in reality. Back then, we relied on that one talented artistic friend to bring our visions to life. But explaining a mental image was often frustrating after all, you were relying on another person’s interpretation of your words, which often led to results that weren’t quite what you had in mind. AI image generators use deep learning algorithms to interpret text descriptions and transform them into