Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Ransomfeed 320x100 1
2nd Edition GlitchZone RHC 970x120 2

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
21 Years of Firefox: A History of Innovation and Independence
Di Redazione RHC - 10/11/2025

November 9th marked the 21st anniversary of Firefox 1.0. In 2004, it was the first stable release of Mozilla’s new browser, which quickly positioned itself as a simple and secure alternative to ...

Immagine del sito
Malware is a ticking time bomb! The threat to Siemens S7 PLCs begins in 2027.
Di Redazione RHC - 10/11/2025

Researchers discovered several libraries in the public NuGet registry containing code that will be activated in 2027 and 2028. The infected packages target three popular .NET data storage engines (Mic...

Immagine del sito
Vault7 with a Chinese twist: China’s secret global surveillance system exposed
Di Redazione RHC - 10/11/2025

Only the flag changes, but the result is always the same. In 2017, WikiLeaks published Vault7 , a leak that exposed the CIA’s arsenal: toolkits for penetrating smartphones, smart TVs, and operat...

Immagine del sito
Whisper Leak: The New Side-Channel Attack That Steals Messages with LLMs
Di Redazione RHC - 10/11/2025

Microsoft has announced a new side-channel attack on remote language models. It allows a passive attacker, capable of viewing encrypted network traffic, to use artificial intelligence to determine the...

Immagine del sito
Techno-optimism vs. the power of control: are we the greatest threat from AI?
Di Olivia Terragni - 09/11/2025

Imagine a futuristic city split in half: on one side, glittering towers of innovation; on the other, chaos and the shadows of lost control. This isn’t a dystopian vision, but rather the landscap...

No flesh, no bones, just code! Channel 4’s first AI presenter arrives.

On Monday 20 October, Channel 4 broadcast a full-length documentary hosted by a creative TV presenter powered entirely by artificial intelligence. " ...
Redazione RHC - 24/10/2025 - 13:45

DC Comics takes a stand: “No generative AI”

DC Comics has definitively stated its position on generative AI: no machine involvement in the storytelling or illustrations . The announcement wa...
Redazione RHC - 24/10/2025 - 13:04

$792,750 in one day! 56 zerodays detected at Pwn2Own Ireland 2025

On the second day of the Pwn2Own Ireland 2025 competition, participants achieved impressive success, discovering 56 new zero-day vulnerabilities and e...
Redazione RHC - 24/10/2025 - 10:26

A “hacked” water system: hacktivism becomes digital propaganda

In September, Forescout specialists detected a targeted attack on their honeypot server, which mimicked the control system of a water treatment plant....
Redazione RHC - 24/10/2025 - 09:57

Russia and Cybercrime: A Balance Between Selective Repression and State Interest

The Russian cybercrime ecosystem has entered a phase of profound transformation, triggered by a combination of factors: unprecedented international pr...
Ada Spinelli - 24/10/2025 - 09:22

Hackers can access Microsoft Teams chats and emails using access tokens

A recent discovery has revealed that hackers can exploit a flaw in Microsoft Teams on Windows to obtain encrypted authentication tokens , which grant ...
Redazione RHC - 24/10/2025 - 08:02
1 24 25 26 27 28 228

No flesh, no bones, just code! Channel 4’s first AI presenter arrives.

- October 24th, 2025

On Monday 20 October, Channel 4 broadcast a full-length documentary hosted by a creative TV presenter powered entirely by artificial intelligence. " I'm not real. For the first time on...

Facebook Linkedin X

DC Comics takes a stand: “No generative AI”

- October 24th, 2025

DC Comics has definitively stated its position on generative AI: no machine involvement in the storytelling or illustrations . The announcement was made by company president Jim Lee during a...

Facebook Linkedin X

$792,750 in one day! 56 zerodays detected at Pwn2Own Ireland 2025

- October 24th, 2025

On the second day of the Pwn2Own Ireland 2025 competition, participants achieved impressive success, discovering 56 new zero-day vulnerabilities and earning a total of $792,750. This is the second phase...

Facebook Linkedin X

A “hacked” water system: hacktivism becomes digital propaganda

- October 24th, 2025

In September, Forescout specialists detected a targeted attack on their honeypot server, which mimicked the control system of a water treatment plant. A new hacktivist group, TwoNet , operating in...

Facebook Linkedin X

Russia and Cybercrime: A Balance Between Selective Repression and State Interest

- October 24th, 2025

The Russian cybercrime ecosystem has entered a phase of profound transformation, triggered by a combination of factors: unprecedented international pressure from law enforcement agencies, a shift in domestic priorities, and...

Facebook Linkedin X

Hackers can access Microsoft Teams chats and emails using access tokens

- October 24th, 2025

A recent discovery has revealed that hackers can exploit a flaw in Microsoft Teams on Windows to obtain encrypted authentication tokens , which grant unauthorized access to chats, emails, and...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE