Red Hot Cyber. The Cybersecurity Blog
ChatGPT Atlas: Researchers Discover How a Link Can Lead to Jailbreak
NeuralTrust researchers have discovered a vulnerability in OpenAI’s ChatGPT Atlas browser. This time, the attack vector is linked to the omnibox, the bar where users enter URLs or search queries...
Malware alert: Critical WordPress plugin vulnerabilities actively exploited
Wordfence is raising the alarm about a large-scale malware campaign in which attackers are exploiting critical vulnerabilities in the popular WordPress plugins GutenKit and Hunk Companion . The compan...
Gemini 3.0 Pro: What people who are trying it say
In recent days, a select few users have reported having access to the new Gemini 3.0 Pro model. Initial impressions suggest a significant improvement over the previous generation, so much so that many...
China promotes global AI governance under the United Nations
On October 27, the Blue Hall Forum on the theme of “Improving Global Governance and Building a Community with a Shared Future for Humanity” was held at the Ministry of Foreign Affairs in B...
Criminal Hackers Breach US Nuclear Weapons Production Facilities
Government hackers breached a nuclear weapons component manufacturing facility in the United States by exploiting vulnerabilities in Microsoft SharePoint. The incident affected the Kansas City Nationa...
BreachForums Resurrects After Yet Another FBI Shutdown
We’ve often quoted this phrase: “Fighting cybercrime is like pulling weeds: if you don’t completely eradicate them, they’ll grow back, much more vigorous than before,” an...
Gemini 3.0 Pro: Google prepares for the generational leap and aims to surpass GPT-5 and Claude 4.5
Over the past few days, some users have received a notification saying that their Gemini Advanced devices have been “upgraded from the previous generation model to the 3.0 Pro, the smartest mode...
Critical RCE exploit in Microsoft WSUS actively exploited. CISA warns: imminent risk
A global alert has been issued by the United States Cybersecurity and Infrastructure Security Agency (CISA) regarding the active exploitation of a critical remote code execution (RCE) flaw in Microsof...
No flesh, no bones, just code! Channel 4’s first AI presenter arrives.
On Monday 20 October, Channel 4 broadcast a full-length documentary hosted by a creative TV presenter powered entirely by artificial intelligence. ” I’m not real. For the first time on a B...
Russia and Cybercrime: A Balance Between Selective Repression and State Interest
The Russian cybercrime ecosystem has entered a phase of profound transformation, triggered by a combination of factors: unprecedented international pressure from law enforcement agencies, a shift in d...
Featured Articles

NeuralTrust researchers have discovered a vulnerability in OpenAI’s ChatGPT Atlas browser. This time, the attack vector is linked to the omnibox, the bar where users enter URLs or search queries...

Wordfence is raising the alarm about a large-scale malware campaign in which attackers are exploiting critical vulnerabilities in the popular WordPress plugins GutenKit and Hunk Companion . The compan...

In recent days, a select few users have reported having access to the new Gemini 3.0 Pro model. Initial impressions suggest a significant improvement over the previous generation, so much so that many...

On October 27, the Blue Hall Forum on the theme of “Improving Global Governance and Building a Community with a Shared Future for Humanity” was held at the Ministry of Foreign Affairs in B...

Government hackers breached a nuclear weapons component manufacturing facility in the United States by exploiting vulnerabilities in Microsoft SharePoint. The incident affected the Kansas City Nationa...
Neolix raises $600 million for autonomous driving in urban logistics
Supercomputing power in a refrigerator: the BIE-1 revolution
Critical RCE exploit in Microsoft WSUS actively exploited. CISA warns: imminent risk
Google DeepMind launches Gemini Robotics-ER1.5 for advanced robotics
New cyber attack campaign by the BO Team group
AVKiller + HeartCrypt: The Combo That Opens the Door to Ransomware

Neolix raises $600 million for autonomous driving in urban logistics
Redazione RHC - October 25th, 2025
Chinese startup Neolix , specializing in Level 4 autonomous vehicles for urban deliveries, announced on October 23 that it has closed a Series D round of over $600 million ,...

Supercomputing power in a refrigerator: the BIE-1 revolution
Redazione RHC - October 25th, 2025
On October 24, the world's first human-inspired intelligent computing system, the "BI Explorer BIE-1," was officially unveiled at the Guangdong-Macao Deep Cooperation Zone in Hengqin. Zhang Xu, director of the...

Critical RCE exploit in Microsoft WSUS actively exploited. CISA warns: imminent risk
Redazione RHC - October 25th, 2025
A global alert has been issued by the United States Cybersecurity and Infrastructure Security Agency (CISA) regarding the active exploitation of a critical remote code execution (RCE) flaw in Microsoft’s...

Google DeepMind launches Gemini Robotics-ER1.5 for advanced robotics
Redazione RHC - October 25th, 2025
On September 25, 2025, Google DeepMind released Gemini Robotics-ER 1.5, a model designed for use in robotics. This is the first version of the reasoning system publicly available to developers...

New cyber attack campaign by the BO Team group
Redazione RHC - October 25th, 2025
In early September 2025, Kaspersky Lab experts discovered a new campaign from the BO Team group, targeting Russian organizations across various sectors. Hacktivists updated their toolkit, targeting companies with a...

AVKiller + HeartCrypt: The Combo That Opens the Door to Ransomware
Redazione RHC - October 25th, 2025
A tool has appeared on the cybercriminal market that has quickly become a mass-produced weapon for dozens of groups. It's HeartCrypt , a malware packaging service masquerading as a legitimate...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

