Red Hot Cyber. The Cybersecurity Blog
Bus becomes travelling museum of retro computers in UK
In the UK, father and son Jason and Luke Stoner have transformed an old school bus into a traveling museum dedicated to retro computers and game consoles. The inspiration came when Luke visited the fa...
100 years of Italian Intelligence! Mattarella celebrates the SIM’s centenary at the Quirinale Palace
October 15, 2025 marks an anniversary of exceptional importance in the history of Italian national security: one hundred years since the birth of the Military Information Service (SIM) , the country&#...
But what kind of Sovereign AI is running on the servers and algorithms of a US company!
This year, OpenAI announced a series of projects with foreign governments to create “sovereign AI” systems. According to the company, some of these agreements are currently being negotiate...
Flirt, eroticism, and the end of censorship! OpenAI will change the rules of ChatGPT.
OpenAI is preparing a major change to ChatGPT’s rules: starting in December, age-verified users will be able to interact with adult content, including erotica. The company’s CEO, Sam Altma...
“Double Bind” Leads to GPT-5 Jailbreak: The AI That Was Convinced It Was Schizophrenic
A new and unusual jailbreaking method, the art of circumventing the limitations imposed on artificial intelligence, has reached our editorial office. It was developed by computer security researcher A...
AI Alignment: Where Does AI Learn Right and Wrong?
The other day on LinkedIn, I found myself having a conversation with someone who was seriously interested in the topic of artificial intelligence applied to law. It wasn’t one of those barroom c...
Microsoft Patch Tuesday: 175 vulnerabilities fixed and two zero-days exploited
In its latest update, the tech giant fixed 175 vulnerabilities affecting its core products and underlying systems, including two actively exploited zero-day vulnerabilities , the company said in its l...
12 security bugs discovered in Ivanti Endpoint Manager (EPM). Update now!
Ivanti has published 13 vulnerabilities in its Endpoint Manager (EPM) software , including two high-severity flaws that could allow remote code execution and privilege escalation . Despite the lack of...
WhatsApp Web in the crosshairs! How the worm that distributes the banking Trojan works
Sophos analysts have discovered a complex malware operation by security experts that uses the popular messaging service WhatsApp to spread banking Trojans, targeting Brazilian banks and cryptocurrency...
RMPocalypse: A critical bug in AMD SEV-SNP threatens cloud security.
A critical vulnerability has been identified in the AMD SEV-SNP hardware security architecture, impacting major cloud providers (AWS, Microsoft Azure, and Google Cloud) . This flaw allows malicious hy...
Featured Articles

In the UK, father and son Jason and Luke Stoner have transformed an old school bus into a traveling museum dedicated to retro computers and game consoles. The inspiration came when Luke visited the fa...

October 15, 2025 marks an anniversary of exceptional importance in the history of Italian national security: one hundred years since the birth of the Military Information Service (SIM) , the country&#...

This year, OpenAI announced a series of projects with foreign governments to create “sovereign AI” systems. According to the company, some of these agreements are currently being negotiate...

OpenAI is preparing a major change to ChatGPT’s rules: starting in December, age-verified users will be able to interact with adult content, including erotica. The company’s CEO, Sam Altma...

A new and unusual jailbreaking method, the art of circumventing the limitations imposed on artificial intelligence, has reached our editorial office. It was developed by computer security researcher A...
The Poison of Curiosity and the Antidote of Cyber Hygiene: A Social Engineering Recipe
LatentBreak: A New Attack Method for Language Models
Alert: Thousands of Italian websites at risk! 526,000 sites and 6,500 databases for sale on the Darkweb
F5 Suffers Security Breach: Source Code and Sensitive Data Stolen
Software Update Renders Jeep 4xe Vehicles Unusable
But what kind of Sovereign AI is running on the servers and algorithms of a US company!

The Poison of Curiosity and the Antidote of Cyber Hygiene: A Social Engineering Recipe
Stefano Gazzella - October 16th, 2025
Curiosity, that old rascal. It's the kind of thing that's been making people click links or open attachments in a decidedly reckless manner for a long time. After all, it's...

LatentBreak: A New Attack Method for Language Models
Redazione RHC - October 16th, 2025
A group of scientists has developed a new way to attack large language models : a method called LatentBreak . Unlike previous techniques, it doesn't use complex hints or unusual...

Alert: Thousands of Italian websites at risk! 526,000 sites and 6,500 databases for sale on the Darkweb
Luca Stivali - October 16th, 2025
A new post on the dark web offers full access to thousands of MySQL servers and databases owned by Italian shared hosting providers. In the last few hours, a new...

F5 Suffers Security Breach: Source Code and Sensitive Data Stolen
Redazione RHC - October 16th, 2025
A serious security incident has been reported by F5, a leading provider of application security and delivery solutions. A complex nation-state threat actor had gained long-term access to internal systems,...

Software Update Renders Jeep 4xe Vehicles Unusable
Redazione RHC - October 16th, 2025
A software update released last weekend for Jeep 4xe hybrid models caused a serious malfunction: the vehicles stopped working, leaving owners literally stranded. The problem occurred after a failed over-the-air...

But what kind of Sovereign AI is running on the servers and algorithms of a US company!
Redazione RHC - October 16th, 2025
This year, OpenAI announced a series of projects with foreign governments to create "sovereign AI" systems. According to the company, some of these agreements are currently being negotiated with U.S....
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE