Welcome to Red Hot Cyber | Cybersecurity News
Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Crowdstrike 320×100
2nd Edition GlitchZone RHC 970x120 2

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Apple’s Major Shake-Up: Johny Srouji Leaves as Senior VP of Hardware Technologies
Di Redazione RHC - 07/12/2025

Apple is going through a period of major leadership changes , with the departure of key figures who have contributed significantly to the company’s technological development. The latest executive to...

Immagine del sito
Cloudflare Outage: 25 Minutes of Chaos Due to React Server Issue
Di Redazione RHC - 07/12/2025

Cloudflare experienced a significant outage on the morning of December 5, 2025, when at 8:47 a.m. UTC, a portion of its infrastructure began experiencing internal errors. The incident, which lasted ap...

Immagine del sito
Apache Tika Vulnerability CVE-2025-66516: Critical XXE Attack Risk
Di Redazione RHC - 06/12/2025

A critical vulnerability has been published in Apache Tika that could allow an XML external entity injection attack, known as XXE . The vulnerability, classified as CVE-2025-66516, has a CVE severity ...

Immagine del sito
China Accuses US of Cyber Attacks, Denies Involvement in Brickstorm Malware
Di Redazione RHC - 06/12/2025

A spokesperson for the Chinese Embassy in Canada responded to a reporter’s question about the outcry in Canada over so-called “Chinese cyber attacks.” A reporter asked : Recently, the Canadian C...

Immagine del sito
Microsoft 365 Price Hike: What You Need to Know About the 2026 Increase
Di Redazione RHC - 06/12/2025

Starting July 1, 2026, Microsoft 365 and Office 365 subscription prices for business and government customers will increase by 8% to 33% , depending on the plan. This price adjustment will apply to bo...

Slammer, the first worm to use a bug that hasn’t been fixed for six months.

Many years have passed since the SQL Slammer worm spread uncontrollably on January 25, 2003. It was one of the fastest-spreading malware in history , ...
Redazione RHC - 12/11/2025 - 22:24

The Story of the First Keylogger: How Hidden Keyboard Control Came to Be

We all know Bruce Schneier , a renowned cryptography and computer security expert, member of the board of directors of the International Association f...
Redazione RHC - 12/11/2025 - 22:19

A Brief History of Malware: The Evolution of the Species from Its Origins to the Present Day

At first we talked about “viruses” , then “worms” appeared, followed by “macro viruses”. These were soon joined by other types of hostile software suc...
Redazione RHC - 12/11/2025 - 22:17

What Are Large Language Models? Behind the Scenes of Artificial Intelligence

In the rapidly evolving world of artificial intelligence (AI), one term has emerged with increasing importance: Language Model, especially large langu...
Marcello Politi - 12/11/2025 - 22:11

Let’s discover the differences between a Machine Learning and Deep Learning algorithm

In the world of artificial intelligence, we often hear two terms: machine learning (ML) and deep learning (DL). Both are methods for implementing AI t...
Marcello Politi - 12/11/2025 - 22:08

Hallucination in Artificial Intelligence: Between Strange and Disturbing Errors

Hallucinating, for a human, means perceiving things that aren't actually present in our environment. When we talk about "hallucinations" in artificial...
Simone Raponi - 12/11/2025 - 22:06
1 34 35 36 37 38 270

Slammer, the first worm to use a bug that hasn’t been fixed for six months.

- November 11th, 2025

Many years have passed since the SQL Slammer worm spread uncontrollably on January 25, 2003. It was one of the fastest-spreading malware in history , and with this article we...

Facebook Linkedin X

The Story of the First Keylogger: How Hidden Keyboard Control Came to Be

- November 11th, 2025

We all know Bruce Schneier , a renowned cryptography and computer security expert, member of the board of directors of the International Association for Cryptological Research and a renowned speaker,...

Facebook Linkedin X

A Brief History of Malware: The Evolution of the Species from Its Origins to the Present Day

- November 11th, 2025

At first we talked about “viruses” , then “worms” appeared, followed by “macro viruses”. These were soon joined by other types of hostile software such as keyloggers or lockers. At...

Facebook Linkedin X

What Are Large Language Models? Behind the Scenes of Artificial Intelligence

- November 11th, 2025

In the rapidly evolving world of artificial intelligence (AI), one term has emerged with increasing importance: Language Model, especially large language models, then called Large Language Models. You've likely already...

Facebook Linkedin X

Let’s discover the differences between a Machine Learning and Deep Learning algorithm

- November 11th, 2025

In the world of artificial intelligence, we often hear two terms: machine learning (ML) and deep learning (DL). Both are methods for implementing AI through the training of machine learning...

Facebook Linkedin X

Hallucination in Artificial Intelligence: Between Strange and Disturbing Errors

- November 11th, 2025

Hallucinating, for a human, means perceiving things that aren't actually present in our environment. When we talk about "hallucinations" in artificial intelligence (AI), we're referring to a situation in which...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE