Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

RHC interviews ShinyHunters: “Systems can be repaired, but people remain vulnerable!”
Di RHC Dark Lab - 17/09/2025

ShinyHunters is a group of threat actors that gained notoriety after the massive data breach against Salesforce, an incident that led Google to closely monitor them and assign them the code name UNC62...

The Great Firewall in the Spotlight: The Leak Revealing the Industrialization of Chinese Censorship
Di Redazione RHC - 16/09/2025

Edited by Luca Stivali and Olivia Terragni. On September 11, 2025, what can be defined as the largest leak ever suffered by the Great Firewall of China (GFW) exploded in the media, massively and massi...

OpenAI and Microsoft reach agreement to transform into a public utility company.
Di Redazione RHC - 13/09/2025

OpenAI has entered into a memorandum of understanding with Microsoft to review its partnership, which could lead to the company’s transformation into a Public Benefit Corporation (PBC). If the trans...

Goodbye PowerShell 2.0 and WMIC! The great Windows 11 cleanup has begun.
Di Redazione RHC - 12/09/2025

Windows 11 users who have installed the September 2025 Update might think that practically nothing changes. At first glance, KB5065426 looks like a normal small patch that Microsoft distributes to eve...

Looking for Volodymyr Tymoshchuk! 11 million dollars for the Nefilim hacker
Di Redazione RHC - 12/09/2025

The U.S. Department of Justice has indicted Ukrainian Volodymyr Tymoshchuk on seven counts of computer hacking and extortion. He is considered one of the most dangerous hackers of recent years. The in...

China launches compact space debris removal system

Chinese scientists have unveiled a compact space launcher, initially designed to remove dangerous space debris, but which could potentially be used as...
Redazione RHC - 29/08/2025 - 12:57

What is Wetware: The Future of Brain Enhancement Through Hardware and Software

By definition, wetware refers to technology that combines hardware and software to enhance biological life forms. Steve M. Potter, an associate profes...
Massimiliano Brolli - 29/08/2025 - 10:58

AI browser extensions? There’s too much uncertainty: the risk still lies in user awareness!

Anthropic has raised the alarm about a new threat related to "smart" browser extensions: Websites can infiltrate hidden commands that an AI agent will...
Redazione RHC - 29/08/2025 - 10:21

Little engineers for big robots! Is Italy also focusing on young people?

In Stavropol, Russian Federation, the race for the regional robotics championship for younger students has officially begun. Applications can be submi...
Redazione RHC - 29/08/2025 - 10:11

Phishing on Teams: at least the hacker responds faster than the real help desk!

In recent months, as previously reported on Red Hot Cyber, a new front has emerged in the corporate phishing landscape: Microsoft Teams attacks in whi...
Redazione RHC - 29/08/2025 - 09:02

It’s a global cyber shock! Beijing’s 007s are infiltrating and compromising the world’s Internet backbones.

The United States and several allied countries have issued a joint warning about a growing cyber offensive conducted by actors sponsored by the People...
Redazione RHC - 29/08/2025 - 08:42
1 32 33 34 35 36 147

China launches compact space debris removal system

- August 29th, 2025

Chinese scientists have unveiled a compact space launcher, initially designed to remove dangerous space debris, but which could potentially be used as a weapon. The project was conceived by engineers...

  

What is Wetware: The Future of Brain Enhancement Through Hardware and Software

- August 29th, 2025

By definition, wetware refers to technology that combines hardware and software to enhance biological life forms. Steve M. Potter, an associate professor at the Neuroengineering Laboratory at the University of...

  

AI browser extensions? There’s too much uncertainty: the risk still lies in user awareness!

- August 29th, 2025

Anthropic has raised the alarm about a new threat related to "smart" browser extensions: Websites can infiltrate hidden commands that an AI agent will execute without thinking. Anthropic has released...

  

Little engineers for big robots! Is Italy also focusing on young people?

- August 29th, 2025

In Stavropol, Russian Federation, the race for the regional robotics championship for younger students has officially begun. Applications can be submitted starting August 25th, with a window that will remain...

  

Phishing on Teams: at least the hacker responds faster than the real help desk!

- August 29th, 2025

In recent months, as previously reported on Red Hot Cyber, a new front has emerged in the corporate phishing landscape: Microsoft Teams attacks in which attackers impersonate IT or help...

  

It’s a global cyber shock! Beijing’s 007s are infiltrating and compromising the world’s Internet backbones.

- August 29th, 2025

The United States and several allied countries have issued a joint warning about a growing cyber offensive conducted by actors sponsored by the People's Republic of China. According to a...

  

Sign up for the newsletter