Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Will this latest article “against” ChatControl be absolutely useless?
Di Stefano Gazzella - 18/09/2025

We had already discussed the proposed “ChatControl” regulation almost two years ago, but given the roadmap currently underway, we find ourselves embarrassed to have to discuss it again. It feels l...

RHC interviews ShinyHunters: “Systems can be repaired, but people remain vulnerable!”
Di RHC Dark Lab - 17/09/2025

ShinyHunters is a group of threat actors that gained notoriety after the massive data breach against Salesforce, an incident that led Google to closely monitor them and assign them the code name UNC62...

The Great Firewall in the Spotlight: The Leak Revealing the Industrialization of Chinese Censorship
Di Redazione RHC - 16/09/2025

Edited by Luca Stivali and Olivia Terragni. On September 11, 2025, what can be defined as the largest leak ever suffered by the Great Firewall of China (GFW) exploded in the media, massively and massi...

OpenAI and Microsoft reach agreement to transform into a public utility company.
Di Redazione RHC - 13/09/2025

OpenAI has entered into a memorandum of understanding with Microsoft to review its partnership, which could lead to the company’s transformation into a Public Benefit Corporation (PBC). If the trans...

Goodbye PowerShell 2.0 and WMIC! The great Windows 11 cleanup has begun.
Di Redazione RHC - 12/09/2025

Windows 11 users who have installed the September 2025 Update might think that practically nothing changes. At first glance, KB5065426 looks like a normal small patch that Microsoft distributes to eve...

The new cybersecurity battlefield? Your brain!

Welcome to the first installment of our series, a three-week journey exploring the extraordinary dance between coevolution, cybersecurity, and the hum...
Daniela Farina - 02/09/2025 - 10:13

Wikipedia under the US Congress’s scrutiny: when freedom of expression becomes “under special surveillance”

On August 27, 2025, the Wikimedia Foundation, which operates Wikipedia, received an official letter from the Committee on Oversight and Government Ref...
Sandro Sana - 02/09/2025 - 09:21

From AI chatbots to global data theft: The Drift flaw rocks Google Workspace.

Last week, it emerged that criminal hackers had compromised the sales automation platform Salesloft and stolen OAuth and update tokens from customers ...
Redazione RHC - 02/09/2025 - 07:56

Confidentiality vs. Privacy: The Concept Everyone Confuses (and Why It’s Dangerous)

Every day we hear about privacy in every aspect of our lives, so much so that the term has entered common parlance. But what does it really mean? What...
Antonino Battaglia - 02/09/2025 - 07:42

Tea Dating App Data Breach: 72,000 Images and Over 1 Million Private Messages

The "Tea Dating Advice" app reported a data breach on July 25, 2025, involving 72,000 images of users registered before February 2024, including 13,00...
Stefano Gazzella - 02/09/2025 - 07:35

Artificial consciousness: abroad it’s science, in Italy it’s taboo.

Abroad, it's already a recognized field of study, but here it's almost taboo: a journey through science, philosophy, and ethical perspectives. 1. T...
Alessandro Rugolo - 02/09/2025 - 07:30
1 27 28 29 30 31 148

The new cybersecurity battlefield? Your brain!

- September 2nd, 2025

Welcome to the first installment of our series, a three-week journey exploring the extraordinary dance between coevolution, cybersecurity, and the humanities, with a focus on coaching. Each week, we'll tackle...

  

Wikipedia under the US Congress’s scrutiny: when freedom of expression becomes “under special surveillance”

- September 2nd, 2025

On August 27, 2025, the Wikimedia Foundation, which operates Wikipedia, received an official letter from the Committee on Oversight and Government Reform of the United States House of Representatives.The letter,...

  

From AI chatbots to global data theft: The Drift flaw rocks Google Workspace.

- September 2nd, 2025

Last week, it emerged that criminal hackers had compromised the sales automation platform Salesloft and stolen OAuth and update tokens from customers in its AI agent Drift, designed to integrate...

  

Confidentiality vs. Privacy: The Concept Everyone Confuses (and Why It’s Dangerous)

- September 2nd, 2025

Every day we hear about privacy in every aspect of our lives, so much so that the term has entered common parlance. But what does it really mean? What happens...

  

Tea Dating App Data Breach: 72,000 Images and Over 1 Million Private Messages

- September 2nd, 2025

The "Tea Dating Advice" app reported a data breach on July 25, 2025, involving 72,000 images of users registered before February 2024, including 13,000 selfies and documents uploaded for account...

  

Artificial consciousness: abroad it’s science, in Italy it’s taboo.

- September 2nd, 2025

Abroad, it's already a recognized field of study, but here it's almost taboo: a journey through science, philosophy, and ethical perspectives. 1. The Great Italian Absentee In Italy, artificial intelligence...

  

Sign up for the newsletter