Welcome to Red Hot Cyber | Cybersecurity News
Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
TM RedHotCyber 320x100 042514
Banner Ancharia Desktop 1 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Gartner Warns: AI-Powered Browsers Pose Significant Security Risks to Businesses
Di Redazione RHC - 10/12/2025

Gartner analysts have urged businesses to temporarily stop using browsers with built-in artificial intelligence (AI) capabilities . In a recent advisory, the company emphasizes that such tools pose un...

Immagine del sito
Fortinet Vulnerability: Critical FortiOS, FortiWeb, FortiProxy, FortiSwitchManager Update
Di Redazione RHC - 10/12/2025

A critical vulnerability affecting the FortiOS, FortiWeb, FortiProxy , and FortiSwitchManager product lines has been reported by Fortinet via an urgent security advisory. This advisory was issued in c...

Immagine del sito
US Allows Nvidia to Sell Advanced AI Chips to China, Easing Export Restrictions
Di Redazione RHC - 09/12/2025

It seems the White House isn’t entirely clear … at least judging by yet another change of heart regarding the sale of Nvidia’s advanced chips to China, with the Trump administration having decid...

Immagine del sito
Ransomware Attacks Decline in 2024, But Threat Remains High with $734M in Ransom
Di Redazione RHC - 09/12/2025

According to a recently released report by the Financial Crimes Enforcement Network (FinCEN) , global ransomware activity peaked in 2023, only to plummet in 2024. This decline is attributed to success...

Immagine del sito
Intellexa Exploits Zero-Day Vulnerabilities with Spyware
Di Redazione RHC - 08/12/2025

Despite significant geopolitical challenges, the mercenary spyware industry remains a resilient and persistent threat; in this context, the well-known vendor Intellexa continues to expand its arsenal....

Difference between a classical algorithm and an AI software

In the digital age we live in, artificial intelligence (AI) is gaining increasing attention. But what distinguishes a classical algorithm from AI soft...
Simone Raponi - 12/11/2025 - 22:01

What is a neural network? Discover the technology behind artificial intelligence.

In the contemporary technological landscape, one term stands out: neural network. The foundation of artificial intelligence, neural networks represent...
Simone Raponi - 12/11/2025 - 21:58

Discovering Sandworm: The Kremlin’s National State Group

As we know, there are different types of cybercriminals. There are ethical hackers and criminal hackers. Within criminal hackers, there are a multitud...
Redazione RHC - 12/11/2025 - 21:30

Discovering DarkSide: Techniques, Tactics, and Affiliations

Researchers across the cyber community have been exchanging a great deal of information lately about the DarkSide ransomware cyber gang, the emerging ...
Redazione RHC - 12/11/2025 - 21:24

Salt Typhoon (RedMike): The Chinese Cyber Threat That’s Shaking the World

In recent months, the Chinese hacking group known as Salt Typhoon has continued to make headlines for its aggressive and persistent cybersecurity tact...
RHC Dark Lab - 12/11/2025 - 21:17

Remember NVIDIA DGX Spark? Here comes the GMKtec EVO-X2, at half the price.

Chinese manufacturer GMKtec has presented its new EVO-X2 mini PC , equipped with a Ryzen AI Max+ 395 processor , claiming performance comparable – and...
Redazione RHC - 12/11/2025 - 19:27
1 39 40 41 42 43 274

Difference between a classical algorithm and an AI software

- November 11th, 2025

In the digital age we live in, artificial intelligence (AI) is gaining increasing attention. But what distinguishes a classical algorithm from AI software? In this article, we'll explore the differences...

Facebook Linkedin X

What is a neural network? Discover the technology behind artificial intelligence.

- November 11th, 2025

In the contemporary technological landscape, one term stands out: neural network. The foundation of artificial intelligence, neural networks represent the future of how we interact with technology. But what exactly...

Facebook Linkedin X

Discovering Sandworm: The Kremlin’s National State Group

- November 11th, 2025

As we know, there are different types of cybercriminals. There are ethical hackers and criminal hackers. Within criminal hackers, there are a multitude of dimensions, including, specifically, nation-state-funded hacker groups...

Facebook Linkedin X

Discovering DarkSide: Techniques, Tactics, and Affiliations

- November 11th, 2025

Researchers across the cyber community have been exchanging a great deal of information lately about the DarkSide ransomware cyber gang, the emerging cybercriminal group that has suddenly risen to global...

Facebook Linkedin X

Salt Typhoon (RedMike): The Chinese Cyber Threat That’s Shaking the World

- November 11th, 2025

In recent months, the Chinese hacking group known as Salt Typhoon has continued to make headlines for its aggressive and persistent cybersecurity tactics. Despite US sanctions and close government surveillance,...

Facebook Linkedin X

Remember NVIDIA DGX Spark? Here comes the GMKtec EVO-X2, at half the price.

- November 11th, 2025

Chinese manufacturer GMKtec has presented its new EVO-X2 mini PC , equipped with a Ryzen AI Max+ 395 processor , claiming performance comparable – and in some cases superior –...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE