Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Ancharia Mobile 1
Fortinet 970x120px

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

GDPR Data Breach: Email Errors and Consequences Cybercrime

GDPR Data Breach: Email Errors and Consequences

Like it or not, sending an email to the wrong recipient constitutes a personal data breach under the GDPR. This...
Stefano Gazzella - 25 November 2025
Ettore Accenti: The Italian Tech Pioneer Who Brought Intel to Italy Cybercrime

Ettore Accenti: The Italian Tech Pioneer Who Brought Intel to Italy

With exclusive photographs and unpublished documents: the extraordinary story of the Italian engineer who collaborated with Gordon Moore and Alan...
Carlo Denza - 25 November 2025
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever Cybercrime

The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his...
Redazione RHC - 25 November 2025
Anthropic Releases Claude Opus 4.5: AI Model for Enhanced Productivity Cybercrime

Anthropic Releases Claude Opus 4.5: AI Model for Enhanced Productivity

Anthropic has released Claude Opus 4.5 , its new flagship model, which the company says is the most powerful version...
Redazione RHC - 24 November 2025
Alibaba Qwen3Max Dominates AI Market with Rapid Growth Cybercrime

Alibaba Qwen3Max Dominates AI Market with Rapid Growth

On November 24, Alibaba announced Qwen3Max, which had been in public beta for a week , and had already surpassed...
Redazione RHC - 24 November 2025
Digital Surveillance at Work: The Rise of Algorithmic Monitoring Cybercrime

Digital Surveillance at Work: The Rise of Algorithmic Monitoring

Remote work has given employees freedom , but with it has also come digital surveillance . We discussed this some...
Redazione RHC - 24 November 2025

Vault7 with a Chinese twist: China’s secret global surveillance system exposed

Only the flag changes, but the result is always the same. In 2017, WikiLeaks published Vault7 , a leak that exposed the CIA's arsenal: toolkits for penetrating smartphones, smart TVs,...
Share on Facebook Share on LinkedIn Share on X

Whisper Leak: The New Side-Channel Attack That Steals Messages with LLMs

Microsoft has announced a new side-channel attack on remote language models. It allows a passive attacker, capable of viewing encrypted network traffic, to use artificial intelligence to determine the topic...
Share on Facebook Share on LinkedIn Share on X

QNAP fixes 7 critical NAS bugs discovered at Pwn2Own Ireland 2025

QNAP has fixed seven critical zero-day vulnerabilities in its Network Attached Storage (NAS) operating systems after a group of researchers successfully exploited them at Pwn2Own Ireland 2025 , held in...
Share on Facebook Share on LinkedIn Share on X

Artificial intelligence surpasses humans, but not in every field. Is AGI near or far away?

According to experts, humanity has entered a new stage in the development of artificial intelligence: an era in which systems no longer simply assist humans , but are able to...
Share on Facebook Share on LinkedIn Share on X
Tecno-ottimismo VS potere del controllo IA

Techno-optimism vs. the power of control: are we the greatest threat from AI?

Imagine a futuristic city split in half: on one side, glittering towers of innovation; on the other, chaos and the shadows of lost control. This isn't a dystopian vision, but...
Share on Facebook Share on LinkedIn Share on X

Google Gemini 3.0: New features and updates for the year’s most anticipated AI assistant

Over the past week, Google announced that the Gemini Assistant can now natively integrate YouTube and Google Maps services without the need to use specific commands like "@YouTube" or "@Google...
Share on Facebook Share on LinkedIn Share on X

Domestic robots and privacy: the hidden price of the automated future

The home of the future is full of robots. Automated laundries, personal assistants, and small electronic housekeepers are all devices designed to free up precious time and make domestic life...
Share on Facebook Share on LinkedIn Share on X

The tale of the Mayor who thought of banning axes… but then came the Saws

Once upon a time, there was a town that had a Magical Forest. It was happy to have it, even a little proud. Which is why all the citizens willingly...
Share on Facebook Share on LinkedIn Share on X

WhatsApp used to spread LANDFALL, the new spyware for Android Samsung

Researchers at Palo Alto Networks Unit 42 have discovered a new, previously unknown family of Android spyware called LANDFALL . To spread it, malicious actors exploited a zero-day vulnerability (CVE-2025-21042)...
Share on Facebook Share on LinkedIn Share on X

Trump and Kim Jong Un summit? There seems to be a high probability of a meeting.

South Korean intelligence agencies , including the National Intelligence Service, reportedly believe there is a high probability that US President Donald Trump will hold a summit with North Korean Workers'...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Browser-in-the-Browser Phishing Attack: How to Protect Yourself
Manuel Roccon - 29/12/2025

This article analyzes a recent and sophisticated phishing campaign that uses the Browser-in-the-Browser (BitB) technique to steal credentials, particularly those from services like Microsoft 365. The BitB attack is notable for its ability to generate…

Immagine del sitoCybercrime
Critical WebKit Vulnerability Exposes iOS Devices to Code Execution
Redazione RHC - 29/12/2025

A new report details a critical vulnerability discovered by security researcher Joseph Goydish in Apple’s WebKit engine. This security flaw, if exploited in conjunction with other exploits, could allow attackers to execute arbitrary code on…

Immagine del sitoCybercrime
Xspeeder Devices Hit by AI-Discovered Zero-Day Vulnerability CVE-2025-54322
Redazione RHC - 29/12/2025

When it comes to cybersecurity, it’s easy to fall into the trap of thinking that problems are always far away, that they only affect others. But the reality is that a vulnerability is always around…

Immagine del sitoCybercrime
Job Scams on Social Media: How to Avoid Fake Remote Job Offers
Redazione RHC - 29/12/2025

Fraudulent job ads promising easy money and remote work continue to flood social media, particularly in the Middle East and North Africa . Under the guise of part-time jobs that require no experience , scammers…

Immagine del sitoCybercrime
Cyber Criminals Recruit Insiders: Companies at Risk of Internal Threats
Redazione RHC - 27/12/2025

The cybercriminal community is rapidly increasing its interest in recruiting personnel from within companies . Instead of sophisticated external attacks, criminals are increasingly relying on internal sources— people willing to provide access to company systems…