Welcome to Red Hot Cyber | Cybersecurity News
Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Ancharia Mobile 1
TM RedHotCyber 970x120 042543

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
KrakenBite Phishing Service Exposed
Di Redazione RHC - 01/12/2025

The underground cybercrime market continues to evolve rapidly, fueled by specialized groups designing and selling tools for increasingly sophisticated digital scams. Among these, a particularly active...

Immagine del sito
ADC Aerospace Hit by Play Ransomware Attack, Data Breach Feared
Di Redazione RHC - 01/12/2025

American aviation and defense components manufacturer ADC Aerospace has found itself in the spotlight due to a possible cyber attack by the Play ransomware group, which appeared on their blog where cr...

Immagine del sito
Microsoft 365 Security Risk: Interface Poisoning Attacks
Di Massimiliano Dal Cero - 01/12/2025

This article analyzes the disclosure submitted to Microsoft and available in English on digitaldefense , where images, demonstration videos and a Python code example are available. In recent years, di...

Immagine del sito
Airbus A320 Recall Due to ELAC System Failure Caused by Solar Flares
Di Redazione RHC - 01/12/2025

Airbus has announced the recall of approximately 6,500 A320 aircraft due to potential failures in the ELAC control system caused by powerful solar flares. The recall followed a sudden loss of altitude...

Immagine del sito
Leonardo’s Michelangelo Dome: AI-Powered Defense Against Hypersonic Threats
Di Redazione RHC - 30/11/2025

Italian defense company Leonardo has unveiled its new Michelangelo Dome system . According to the company, it is designed to counter hypersonic missiles and mass drone attacks . During the technical p...

Difference between a classical algorithm and an AI software

In the digital age we live in, artificial intelligence (AI) is gaining increasing attention. But what distinguishes a classical algorithm from AI soft...
Simone Raponi - 12/11/2025 - 22:01

What is a neural network? Discover the technology behind artificial intelligence.

In the contemporary technological landscape, one term stands out: neural network. The foundation of artificial intelligence, neural networks represent...
Simone Raponi - 12/11/2025 - 21:58

Discovering Sandworm: The Kremlin’s National State Group

As we know, there are different types of cybercriminals. There are ethical hackers and criminal hackers. Within criminal hackers, there are a multitud...
Redazione RHC - 12/11/2025 - 21:30

Discovering DarkSide: Techniques, Tactics, and Affiliations

Researchers across the cyber community have been exchanging a great deal of information lately about the DarkSide ransomware cyber gang, the emerging ...
Redazione RHC - 12/11/2025 - 21:24

Salt Typhoon (RedMike): The Chinese Cyber Threat That’s Shaking the World

In recent months, the Chinese hacking group known as Salt Typhoon has continued to make headlines for its aggressive and persistent cybersecurity tact...
RHC Dark Lab - 12/11/2025 - 21:17

Remember NVIDIA DGX Spark? Here comes the GMKtec EVO-X2, at half the price.

Chinese manufacturer GMKtec has presented its new EVO-X2 mini PC , equipped with a Ryzen AI Max+ 395 processor , claiming performance comparable – and...
Redazione RHC - 12/11/2025 - 19:27
1 26 27 28 29 30 261

Difference between a classical algorithm and an AI software

- November 11th, 2025

In the digital age we live in, artificial intelligence (AI) is gaining increasing attention. But what distinguishes a classical algorithm from AI software? In this article, we'll explore the differences...

Facebook Linkedin X

What is a neural network? Discover the technology behind artificial intelligence.

- November 11th, 2025

In the contemporary technological landscape, one term stands out: neural network. The foundation of artificial intelligence, neural networks represent the future of how we interact with technology. But what exactly...

Facebook Linkedin X

Discovering Sandworm: The Kremlin’s National State Group

- November 11th, 2025

As we know, there are different types of cybercriminals. There are ethical hackers and criminal hackers. Within criminal hackers, there are a multitude of dimensions, including, specifically, nation-state-funded hacker groups...

Facebook Linkedin X

Discovering DarkSide: Techniques, Tactics, and Affiliations

- November 11th, 2025

Researchers across the cyber community have been exchanging a great deal of information lately about the DarkSide ransomware cyber gang, the emerging cybercriminal group that has suddenly risen to global...

Facebook Linkedin X

Salt Typhoon (RedMike): The Chinese Cyber Threat That’s Shaking the World

- November 11th, 2025

In recent months, the Chinese hacking group known as Salt Typhoon has continued to make headlines for its aggressive and persistent cybersecurity tactics. Despite US sanctions and close government surveillance,...

Facebook Linkedin X

Remember NVIDIA DGX Spark? Here comes the GMKtec EVO-X2, at half the price.

- November 11th, 2025

Chinese manufacturer GMKtec has presented its new EVO-X2 mini PC , equipped with a Ryzen AI Max+ 395 processor , claiming performance comparable – and in some cases superior –...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE