Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Mobile V1
LECS 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Gemini 3.0 Pro: Google prepares for the generational leap and aims to surpass GPT-5 and Claude 4.5
Di Redazione RHC - 25/10/2025

Over the past few days, some users have received a notification saying that their Gemini Advanced devices have been “upgraded from the previous generation model to the 3.0 Pro, the smartest mode...

Immagine del sito
Critical RCE exploit in Microsoft WSUS actively exploited. CISA warns: imminent risk
Di Redazione RHC - 25/10/2025

A global alert has been issued by the United States Cybersecurity and Infrastructure Security Agency (CISA) regarding the active exploitation of a critical remote code execution (RCE) flaw in Microsof...

Immagine del sito
No flesh, no bones, just code! Channel 4’s first AI presenter arrives.
Di Redazione RHC - 24/10/2025

On Monday 20 October, Channel 4 broadcast a full-length documentary hosted by a creative TV presenter powered entirely by artificial intelligence. ” I’m not real. For the first time on a B...

Immagine del sito
Russia and Cybercrime: A Balance Between Selective Repression and State Interest
Di Ada Spinelli - 24/10/2025

The Russian cybercrime ecosystem has entered a phase of profound transformation, triggered by a combination of factors: unprecedented international pressure from law enforcement agencies, a shift in d...

Immagine del sito
Hackers can access Microsoft Teams chats and emails using access tokens
Di Redazione RHC - 24/10/2025

A recent discovery has revealed that hackers can exploit a flaw in Microsoft Teams on Windows to obtain encrypted authentication tokens , which grant unauthorized access to chats, emails, and files st...

Artificial General Intelligence (AGI): the first global standard for measuring it has been defined

On October 21, 2025, an international team of researchers from 29 leading institutions—including Stanford University, MIT, and the University of Calif...
Redazione RHC - 23/10/2025 - 20:59

$2.5 billion: The cost of the Jaguar Land Rover cyber attack.

Jaguar Land Rover continues to deal with the fallout from the cyber attack that paralyzed production, disrupted its dealer network, and jeopardized su...
Redazione RHC - 23/10/2025 - 18:35

Court orders NSO Group to stop using spyware against WhatsApp

A federal court has ordered Israeli company NSO Group (developer of the commercial spyware Pegasus) to stop using spyware to target and attack WhatsAp...
Redazione RHC - 23/10/2025 - 16:47

A serious bug in Microsoft 365 Copilot leads to data exfiltration via prompts

An advanced security flaw exists in M365 Copilot that allows attackers to exfiltrate sensitive information from tenants, such as recent emails, throug...
Redazione RHC - 23/10/2025 - 13:30

Russia legalizes white hat hackers with new law

Russia is preparing a new version of a bill legalizing white hat hackers . Two sources in government agencies and the cybersecurity industry told RBC ...
Redazione RHC - 23/10/2025 - 12:05

Azure under attack: Fake apps imitating Microsoft Teams and Azure Portal

A new wave of digital deception has hit the Microsoft Azure ecosystem, where newly discovered vulnerabilities have allowed cybercriminals to create ma...
Luca Galuppi - 23/10/2025 - 07:15

Artificial General Intelligence (AGI): the first global standard for measuring it has been defined

- October 23rd, 2025

On October 21, 2025, an international team of researchers from 29 leading institutions—including Stanford University, MIT, and the University of California, Berkeley —completed a study that marks a milestone in...

Facebook Linkedin X

$2.5 billion: The cost of the Jaguar Land Rover cyber attack.

- October 23rd, 2025

Jaguar Land Rover continues to deal with the fallout from the cyber attack that paralyzed production, disrupted its dealer network, and jeopardized supply chains. Vehicle production at major UK plants...

Facebook Linkedin X

Court orders NSO Group to stop using spyware against WhatsApp

- October 23rd, 2025

A federal court has ordered Israeli company NSO Group (developer of the commercial spyware Pegasus) to stop using spyware to target and attack WhatsApp users. Please note that Pegasus is...

Facebook Linkedin X

A serious bug in Microsoft 365 Copilot leads to data exfiltration via prompts

- October 23rd, 2025

An advanced security flaw exists in M365 Copilot that allows attackers to exfiltrate sensitive information from tenants, such as recent emails, through indirect command injection. Security researcher Adam Logue detailed...

Facebook Linkedin X

Russia legalizes white hat hackers with new law

- October 23rd, 2025

Russia is preparing a new version of a bill legalizing white hat hackers . Two sources in government agencies and the cybersecurity industry told RBC that the document has already...

Facebook Linkedin X

Azure under attack: Fake apps imitating Microsoft Teams and Azure Portal

- October 23rd, 2025

A new wave of digital deception has hit the Microsoft Azure ecosystem, where newly discovered vulnerabilities have allowed cybercriminals to create malicious apps that perfectly mimic official services like Microsoft...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE