Welcome to Red Hot Cyber | Cybersecurity News
Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Fortinet 320x100px
Crowdstriker 970×120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

ToddyCat APT Group Targets Microsoft 365 Email Security

Email security continues to be one of the most critical points in modern cyber attacks. While compromising a Windows domain...
Redazione RHC - 27 November 2025

Tor Boosts Security with Counter Galois Onion CGO Encryption

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to...
Redazione RHC - 27 November 2025

WormGPT 4: AI-Powered Cybercrime Tools on the Rise

Cybercriminals no longer need to convince ChatGPT or Claude Code to write malware or data-stealing scripts. A whole class of...
Redazione RHC - 26 November 2025

EU lawmakers push for Microsoft alternative to boost tech sovereignty

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and...
Redazione RHC - 26 November 2025

Investment Scam Alert: How to Avoid Losing Thousands

Hi everyone... my name is Marco, I'm 37 years old and I work as an administrative clerk in an accounting...
Redazione RHC - 26 November 2025

Trump Launches Genesis AI Mission to Revolutionize US Science

US President Donald Trump signed an executive order, " Launching the Genesis Mission," establishing a national program for the use...
Redazione RHC - 26 November 2025

Top Malware: Flame, the modular “spy” malware targeting the Middle East.

Flame, (also known as Flamer, sKyWIper, Skywiper), is a modular computer malware discovered in 2012 that attacked Middle Eastern target computers running the Microsoft Windows operating system. The program's primary...
Share on Facebook Share on LinkedIn Share on X

Slammer, the first worm to use a bug that hasn’t been fixed for six months.

Many years have passed since the SQL Slammer worm spread uncontrollably on January 25, 2003. It was one of the fastest-spreading malware in history , and with this article we...
Share on Facebook Share on LinkedIn Share on X

The Story of the First Keylogger: How Hidden Keyboard Control Came to Be

We all know Bruce Schneier , a renowned cryptography and computer security expert, member of the board of directors of the International Association for Cryptological Research and a renowned speaker,...
Share on Facebook Share on LinkedIn Share on X

A Brief History of Malware: The Evolution of the Species from Its Origins to the Present Day

At first we talked about “viruses” , then “worms” appeared, followed by “macro viruses”. These were soon joined by other types of hostile software such as keyloggers or lockers. At...
Share on Facebook Share on LinkedIn Share on X

What Are Large Language Models? Behind the Scenes of Artificial Intelligence

In the rapidly evolving world of artificial intelligence (AI), one term has emerged with increasing importance: Language Model, especially large language models, then called Large Language Models. You've likely already...
Share on Facebook Share on LinkedIn Share on X

Let’s discover the differences between a Machine Learning and Deep Learning algorithm

In the world of artificial intelligence, we often hear two terms: machine learning (ML) and deep learning (DL). Both are methods for implementing AI through the training of machine learning...
Share on Facebook Share on LinkedIn Share on X

Hallucination in Artificial Intelligence: Between Strange and Disturbing Errors

Hallucinating, for a human, means perceiving things that aren't actually present in our environment. When we talk about "hallucinations" in artificial intelligence (AI), we're referring to a situation in which...
Share on Facebook Share on LinkedIn Share on X

How do machines learn? Let’s explore supervised, unsupervised, and reward learning approaches.

Artificial intelligence isn't about magic, it's about learning! This article aims to demystify the esotericism surrounding artificial intelligence (AI) by providing a comprehensive answer to the question , "How do...
Share on Facebook Share on LinkedIn Share on X

Difference between a classical algorithm and an AI software

In the digital age we live in, artificial intelligence (AI) is gaining increasing attention. But what distinguishes a classical algorithm from AI software? In this article, we'll explore the differences...
Share on Facebook Share on LinkedIn Share on X

What is a neural network? Discover the technology behind artificial intelligence.

In the contemporary technological landscape, one term stands out: neural network. The foundation of artificial intelligence, neural networks represent the future of how we interact with technology. But what exactly...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sito
DIG AI: The Dark Web’s New AI Tool for Cybercrime
Redazione RHC - 21/12/2025

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…

Immagine del sito
Airbus Eyes Sovereign Cloud to Mitigate US Data Risks
Redazione RHC - 21/12/2025

In recent months, a question has been emerging with increasing insistence on European corporate boards: is the US cloud really safe for all companies? Especially for those operating in strategic sectors or with economic, industrial,…

Immagine del sito
North Korean Hackers Steal $2 Billion in Crypto, Targeting DeFi Sector
Redazione RHC - 21/12/2025

In 2025, North Korean hackers stole a record $2 billion in cryptocurrency , 51% more than the previous year. However, the number of attacks has decreased, while the damage has increased. According to Chainalysis, North…

Immagine del sito
Linux Kernel CVE-2025-68260 Vulnerability Fixed: Rust Code at Risk
Redazione RHC - 19/12/2025

The world of technology is a veritable battlefield, where coding geniuses challenge malicious attackers every day with exploits and security patches. That’s why the recent discovery of a vulnerability in the Linux kernel has caused…

Immagine del sito
HPE OneView Vulnerability CVE-2025-37164: Critical Security Update Required
Redazione RHC - 18/12/2025

Cybersecurity is a serious issue, especially when it comes to vulnerabilities that can compromise an entire system. Well, Hewlett Packard Enterprise (HPE) has just raised the alarm about a truly worrying security flaw in its…