Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
TM RedHotCyber 320x100 042514
LECS 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Whisper Leak: The New Side-Channel Attack That Steals Messages with LLMs
Di Redazione RHC - 10/11/2025

Microsoft has announced a new side-channel attack on remote language models. It allows a passive attacker, capable of viewing encrypted network traffic, to use artificial intelligence to determine the...

Immagine del sito
Techno-optimism vs. the power of control: are we the greatest threat from AI?
Di Olivia Terragni - 09/11/2025

Imagine a futuristic city split in half: on one side, glittering towers of innovation; on the other, chaos and the shadows of lost control. This isn’t a dystopian vision, but rather the landscap...

Immagine del sito
Google Gemini 3.0: New features and updates for the year’s most anticipated AI assistant
Di Redazione RHC - 09/11/2025

Over the past week, Google announced that the Gemini Assistant can now natively integrate YouTube and Google Maps services without the need to use specific commands like “@YouTube” or R...

Immagine del sito
The tale of the Mayor who thought of banning axes… but then came the Saws
Di Stefano Gazzella - 09/11/2025

Once upon a time, there was a town that had a Magical Forest. It was happy to have it, even a little proud. Which is why all the citizens willingly sacrificed a few small comforts to keep it safe and ...

Immagine del sito
WhatsApp used to spread LANDFALL, the new spyware for Android Samsung
Di Redazione RHC - 09/11/2025

Researchers at Palo Alto Networks Unit 42 have discovered a new, previously unknown family of Android spyware called LANDFALL . To spread it, malicious actors exploited a zero-day vulnerability (CVE-2...

Neolix raises $600 million for autonomous driving in urban logistics

Chinese startup Neolix , specializing in Level 4 autonomous vehicles for urban deliveries, announced on October 23 that it has closed a Series D round...
Redazione RHC - 25/10/2025 - 15:45

Supercomputing power in a refrigerator: the BIE-1 revolution

On October 24, the world's first human-inspired intelligent computing system, the "BI Explorer BIE-1," was officially unveiled at the Guangdong-Macao ...
Redazione RHC - 25/10/2025 - 15:37

Critical RCE exploit in Microsoft WSUS actively exploited. CISA warns: imminent risk

A global alert has been issued by the United States Cybersecurity and Infrastructure Security Agency (CISA) regarding the active exploitation of a cri...
Redazione RHC - 25/10/2025 - 09:35

Google DeepMind launches Gemini Robotics-ER1.5 for advanced robotics

On September 25, 2025, Google DeepMind released Gemini Robotics-ER 1.5, a model designed for use in robotics. This is the first version of the reasoni...
Redazione RHC - 25/10/2025 - 09:23

New cyber attack campaign by the BO Team group

In early September 2025, Kaspersky Lab experts discovered a new campaign from the BO Team group, targeting Russian organizations across various sector...
Redazione RHC - 25/10/2025 - 09:16

AVKiller + HeartCrypt: The Combo That Opens the Door to Ransomware

A tool has appeared on the cybercriminal market that has quickly become a mass-produced weapon for dozens of groups. It's HeartCrypt , a malware packa...
Redazione RHC - 25/10/2025 - 09:12
1 22 23 24 25 26 228

Neolix raises $600 million for autonomous driving in urban logistics

- October 25th, 2025

Chinese startup Neolix , specializing in Level 4 autonomous vehicles for urban deliveries, announced on October 23 that it has closed a Series D round of over $600 million ,...

Facebook Linkedin X

Supercomputing power in a refrigerator: the BIE-1 revolution

- October 25th, 2025

On October 24, the world's first human-inspired intelligent computing system, the "BI Explorer BIE-1," was officially unveiled at the Guangdong-Macao Deep Cooperation Zone in Hengqin. Zhang Xu, director of the...

Facebook Linkedin X

Critical RCE exploit in Microsoft WSUS actively exploited. CISA warns: imminent risk

- October 25th, 2025

A global alert has been issued by the United States Cybersecurity and Infrastructure Security Agency (CISA) regarding the active exploitation of a critical remote code execution (RCE) flaw in Microsoft’s...

Facebook Linkedin X

Google DeepMind launches Gemini Robotics-ER1.5 for advanced robotics

- October 25th, 2025

On September 25, 2025, Google DeepMind released Gemini Robotics-ER 1.5, a model designed for use in robotics. This is the first version of the reasoning system publicly available to developers...

Facebook Linkedin X

New cyber attack campaign by the BO Team group

- October 25th, 2025

In early September 2025, Kaspersky Lab experts discovered a new campaign from the BO Team group, targeting Russian organizations across various sectors. Hacktivists updated their toolkit, targeting companies with a...

Facebook Linkedin X

AVKiller + HeartCrypt: The Combo That Opens the Door to Ransomware

- October 25th, 2025

A tool has appeared on the cybercriminal market that has quickly become a mass-produced weapon for dozens of groups. It's HeartCrypt , a malware packaging service masquerading as a legitimate...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE