Welcome to Red Hot Cyber | Cybersecurity News
Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
UtiliaCS 320x100
Enterprise BusinessLog 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Leonardo’s Michelangelo Dome: AI-Powered Defense Against Hypersonic Threats
Di Redazione RHC - 30/11/2025

Italian defense company Leonardo has unveiled its new Michelangelo Dome system . According to the company, it is designed to counter hypersonic missiles and mass drone attacks . During the technical p...

Immagine del sito
WhatsApp Messages Contain Hidden GPS Data, Expert Warns
Di Redazione RHC - 30/11/2025

According to computer forensics expert Elom Daniel, WhatsApp messages can contain hidden geolocation data even when the user hasn’t intentionally shared their location. He claimed to have received a...

Immagine del sito
ChatGPT to Introduce Targeted Ads, Changing Monetization Strategy
Di Redazione RHC - 29/11/2025

Until now, ChatGPT has been ad-free: no banners, no hidden promotions. Even the paid versions worked without pushy offers. But that could change soon. As reported by user X (formerly of Twitter) under...

Immagine del sito
WhatsApp Blocked in Russia: Messaging App Faces Crackdown
Di Redazione RHC - 28/11/2025

The Russian Federation’s Roskomnadzor has announced that it continues to impose systematic restrictions on the messaging app WhatsApp due to violations of Russian law. According to the agency, the s...

Immagine del sito
Shai-Hulud Worm Spreads Beyond npm, Attacks Maven
Di Redazione RHC - 28/11/2025

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Hackers: Who They Are, What They Do, and Their Role in Today’s World

The meaning of " hacker " has deep roots. It derives from the English "to hack," meaning to chip away, cut, strike, or cut. It's a powerful image, tha...
Massimiliano Brolli - 11/11/2025 - 12:42

The First Hackers in History: Hacking Is a Journey, Not a Destination

The word hacking comes from the English verb “to hack,” which means “to damage.” Today, with this short article, I will tell you a piece of the histor...
Massimiliano Brolli - 11/11/2025 - 12:38

The extraordinary story of Alan Turing, the father of computer science: from his tumultuous childhood to his revolutionary contributions

Madras, early 1900s. The British Empire dominates India. Julius, a history graduate from Oxford University, serves as a colonial administrative clerk ...
Carlo Denza - 11/11/2025 - 11:39

Wi-Fi Security: The Evolution from WEP to WPA3 and Self-Defending Networks

From the weaknesses of WEP to the advances of WPA3 , Wi-Fi network security has come a long way. Today, self-defending networks represent the new fron...
Francesco Demarcus - 11/11/2025 - 10:50

The Windows 98 Blue Screen of Death That Changed Microsoft’s Plans

It was April 20, 1998. Microsoft was so embarrassed by the iconic Windows 98 blue screen of death on stage that it decided to change plans for buildin...
Redazione RHC - 11/11/2025 - 07:18

Roblox: The Platform That Puts Children’s Safety at Risk

With over 100 million daily active users , Roblox attracts countless children around the world. Nearly half of its audience is under 13, and in Austra...
Redazione RHC - 11/11/2025 - 07:06
1 30 31 32 33 34 259

Hackers: Who They Are, What They Do, and Their Role in Today’s World

- November 10th, 2025

The meaning of " hacker " has deep roots. It derives from the English "to hack," meaning to chip away, cut, strike, or cut. It's a powerful image, that of...

Facebook Linkedin X

The First Hackers in History: Hacking Is a Journey, Not a Destination

- November 10th, 2025

The word hacking comes from the English verb “to hack,” which means “to damage.” Today, with this short article, I will tell you a piece of the history of hacking,...

Facebook Linkedin X

The extraordinary story of Alan Turing, the father of computer science: from his tumultuous childhood to his revolutionary contributions

- November 10th, 2025

Madras, early 1900s. The British Empire dominates India. Julius, a history graduate from Oxford University, serves as a colonial administrative clerk in the Indian Civil Service. He and his wife,...

Facebook Linkedin X

Evoluzione-da-wep-a-wpa-3

Wi-Fi Security: The Evolution from WEP to WPA3 and Self-Defending Networks

- November 10th, 2025

From the weaknesses of WEP to the advances of WPA3 , Wi-Fi network security has come a long way. Today, self-defending networks represent the new frontier: intelligent systems capable of...

Facebook Linkedin X

The Windows 98 Blue Screen of Death That Changed Microsoft’s Plans

- November 10th, 2025

It was April 20, 1998. Microsoft was so embarrassed by the iconic Windows 98 blue screen of death on stage that it decided to change plans for building a new...

Facebook Linkedin X

Roblox: The Platform That Puts Children’s Safety at Risk

- November 10th, 2025

With over 100 million daily active users , Roblox attracts countless children around the world. Nearly half of its audience is under 13, and in Australia, young players spend an...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE