Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Will this latest article “against” ChatControl be absolutely useless?
Di Stefano Gazzella - 18/09/2025

We had already discussed the proposed “ChatControl” regulation almost two years ago, but given the roadmap currently underway, we find ourselves embarrassed to have to discuss it again. It feels l...

RHC interviews ShinyHunters: “Systems can be repaired, but people remain vulnerable!”
Di RHC Dark Lab - 17/09/2025

ShinyHunters is a group of threat actors that gained notoriety after the massive data breach against Salesforce, an incident that led Google to closely monitor them and assign them the code name UNC62...

The Great Firewall in the Spotlight: The Leak Revealing the Industrialization of Chinese Censorship
Di Redazione RHC - 16/09/2025

Edited by Luca Stivali and Olivia Terragni. On September 11, 2025, what can be defined as the largest leak ever suffered by the Great Firewall of China (GFW) exploded in the media, massively and massi...

OpenAI and Microsoft reach agreement to transform into a public utility company.
Di Redazione RHC - 13/09/2025

OpenAI has entered into a memorandum of understanding with Microsoft to review its partnership, which could lead to the company’s transformation into a Public Benefit Corporation (PBC). If the trans...

Goodbye PowerShell 2.0 and WMIC! The great Windows 11 cleanup has begun.
Di Redazione RHC - 12/09/2025

Windows 11 users who have installed the September 2025 Update might think that practically nothing changes. At first glance, KB5065426 looks like a normal small patch that Microsoft distributes to eve...

Critical vulnerability in IIS Web Deploy: PoC exploit is now public

This week, a proof-of-concept exploit was published for CVE-2025-53772, a critical remote code execution vulnerability in Microsoft's IIS Web Deploy (...
Redazione RHC - 03/09/2025 - 12:30

Tencent Challenges the Giants! New Hunyuan-MT Beats Google Translate and GPT-4.1

Chinese company Tencent has made public the source code of a new set of Hunyuan-MT language models, specially optimized for translation tasks. The dev...
Redazione RHC - 03/09/2025 - 09:54

OpenAI Puts Parents in Control: Parental Controls Arrive on ChatGPT

At a time when controversy over the impact of artificial intelligence on youth mental health is growing, the introduction of parental controls for Cha...
Redazione RHC - 03/09/2025 - 08:59

Lovable, the Swedish AI unicorn that’s revolutionizing programming

This year's TechBBQ conference was packed to capacity at Copenhagen's Bella Center when Anton Osika, co-founder of the AI-powered programming app Lova...
Redazione RHC - 03/09/2025 - 08:00

Open Data and Big Data: Data Management and a Comparison of Hadoop vs. Spark

Today, for all large companies, data represents a strategic resource of primary importance. Thanks to the information obtained, it is possible to esta...
Antonino Battaglia - 03/09/2025 - 07:39

Trend Micro: Beware of the “Task Scam,” the scam targeting online job seekers.

The latest research from the security leader reveals the fraudulent mechanisms behind fake job opportunities offered by digital platforms The numbe...
Redazione RHC - 03/09/2025 - 07:34
1 24 25 26 27 28 148

Critical vulnerability in IIS Web Deploy: PoC exploit is now public

- September 3rd, 2025

This week, a proof-of-concept exploit was published for CVE-2025-53772, a critical remote code execution vulnerability in Microsoft's IIS Web Deploy (msdeploy) tool, which has raised urgent alarms in the .NET...

  

Tencent Challenges the Giants! New Hunyuan-MT Beats Google Translate and GPT-4.1

- September 3rd, 2025

Chinese company Tencent has made public the source code of a new set of Hunyuan-MT language models, specially optimized for translation tasks. The developers claim that the algorithms perform better...

  

OpenAI Puts Parents in Control: Parental Controls Arrive on ChatGPT

- September 3rd, 2025

At a time when controversy over the impact of artificial intelligence on youth mental health is growing, the introduction of parental controls for ChatGPT has been announced as a measure...

  

Lovable, the Swedish AI unicorn that’s revolutionizing programming

- September 3rd, 2025

This year's TechBBQ conference was packed to capacity at Copenhagen's Bella Center when Anton Osika, co-founder of the AI-powered programming app Lovable, took the stage. The fundamental concept of Lovable...

  

Open Data and Big Data: Data Management and a Comparison of Hadoop vs. Spark

- September 3rd, 2025

Today, for all large companies, data represents a strategic resource of primary importance. Thanks to the information obtained, it is possible to establish decision-making strategies that, in every sector, can...

  

Trend Micro: Beware of the “Task Scam,” the scam targeting online job seekers.

- September 3rd, 2025

The latest research from the security leader reveals the fraudulent mechanisms behind fake job opportunities offered by digital platforms The number of victims of the "Task scam" is increasing worldwide,...

  

Sign up for the newsletter