Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
320×100
Fortinet 970x120px

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Nvidia loses 95% of the Chinese AI market! Export restrictions cause its share to plummet
Di Redazione RHC - 17/10/2025

Jen-Hsun Huang, founder and CEO of Nvidia, revealed that recent export restrictions have drastically reduced the presence of the company’s AI chips in China , from 95% to virtually nothing. “Four ...

Immagine del sito
Cyberdrones, radar evasion, and autonomous swarms: Rome, the invisible challenge of Jubilee 2025
Di Francesco Demarcus - 17/10/2025

Jubilee 2025 in Rome presents a challenge not only for managing millions of pilgrims and tourists, but also for protecting urban airspace. Drones, increasingly widespread and accessible, bring with th...

Immagine del sito
Bus becomes travelling museum of retro computers in UK
Di Redazione RHC - 16/10/2025

In the UK, father and son Jason and Luke Stoner have transformed an old school bus into a traveling museum dedicated to retro computers and game consoles. The inspiration came when Luke visited the fa...

Immagine del sito
100 years of Italian Intelligence! Mattarella celebrates the SIM’s centenary at the Quirinale Palace
Di Redazione RHC - 16/10/2025

October 15, 2025 marks an anniversary of exceptional importance in the history of Italian national security: one hundred years since the birth of the Military Information Service (SIM) , the country&#...

Immagine del sito
But what kind of Sovereign AI is running on the servers and algorithms of a US company!
Di Redazione RHC - 16/10/2025

This year, OpenAI announced a series of projects with foreign governments to create “sovereign AI” systems. According to the company, some of these agreements are currently being negotiate...

Vulnerability in Windows RPC protocol: Spoofing and impersonation attacks reported

SafeBreach experts have disclosed details of a vulnerability in the Windows Remote Procedure Call (RPC) protocol, patched by Microsoft in the July 202...
Redazione RHC - 21/09/2025 - 20:57

Patchwork Launches Spear-Phishing Campaign Against Turkish Defense

The Patchwork group, also known by the aliases APT-C-09, APT-Q-36, Chinastrats, Dropping Elephant, Operation Hangover, Quilted Tiger, and Zinc Emerson...
Redazione RHC - 21/09/2025 - 20:53

Hackers don’t want to save you: they want to erase you.

Hackers are increasingly targeting backups – not systems or servers, but the data that companies retain for a limited period of time so they can recov...
Redazione RHC - 21/09/2025 - 11:37

The Story of Microsoft Solitaire: From Launch with Windows 3.0 to Enduring Success

Microsoft first released Solitaire in 1990 with Windows 3.0, as a tool to familiarize users with the graphical interface and mouse use. The game was c...
Redazione RHC - 21/09/2025 - 10:09

Removing private data from AI models? Now you can without accessing the original datasets.

A team from the University of California, Riverside, has demonstrated a new way to remove private and copyrighted data from AI models without accessin...
Redazione RHC - 21/09/2025 - 10:02

Edge vs. Chrome: Microsoft promotes its browser with aggressive ads on Bing

Microsoft has once again launched an aggressive campaign for its proprietary Edge browser. This time, the software giant is displaying a comprehensive...
Redazione RHC - 21/09/2025 - 09:56
1 39 40 41 42 43 193

Vulnerability in Windows RPC protocol: Spoofing and impersonation attacks reported

- September 21st, 2025

SafeBreach experts have disclosed details of a vulnerability in the Windows Remote Procedure Call (RPC) protocol, patched by Microsoft in the July 2025 update. The flaw, CVE-2025-49760, allowed an attacker...

Facebook Linkedin X

Bandiera turchia

Patchwork Launches Spear-Phishing Campaign Against Turkish Defense

- September 21st, 2025

The Patchwork group, also known by the aliases APT-C-09, APT-Q-36, Chinastrats, Dropping Elephant, Operation Hangover, Quilted Tiger, and Zinc Emerson , has launched a new spear-phishing campaign targeting the Turkish...

Facebook Linkedin X

Hackers don’t want to save you: they want to erase you.

- September 21st, 2025

Hackers are increasingly targeting backups – not systems or servers, but the data that companies retain for a limited period of time so they can recover from attacks. A new...

Facebook Linkedin X

The Story of Microsoft Solitaire: From Launch with Windows 3.0 to Enduring Success

- September 21st, 2025

Microsoft first released Solitaire in 1990 with Windows 3.0, as a tool to familiarize users with the graphical interface and mouse use. The game was created by Wes Cherry, with...

Facebook Linkedin X

Removing private data from AI models? Now you can without accessing the original datasets.

- September 21st, 2025

A team from the University of California, Riverside, has demonstrated a new way to remove private and copyrighted data from AI models without accessing the original datasets. The solution addresses...

Facebook Linkedin X

Edge vs. Chrome: Microsoft promotes its browser with aggressive ads on Bing

- September 21st, 2025

Microsoft has once again launched an aggressive campaign for its proprietary Edge browser. This time, the software giant is displaying a comprehensive comparison table between Edge and Chrome directly on...

Facebook Linkedin X
Most Read Articles of the Month Most Read Articles of the Week
  1. The Truth About Windows XP License Key: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8
  2. Computer science graduates with no future! Thousands of resumes ignored, and goodbye to six-figure salaries.
  3. With 50 dollars and physical access to the server, the Cloud goes to hell
  4. Shocking collapse: -71% of job offers for software engineers in three years
  5. Hackers hit the United States: critical federal infrastructure compromised
  1. GitHub is migrating to Azure! And goodbye to new development for a year.
  2. WhatsApp Web in the crosshairs! How the worm that distributes the banking Trojan works
  3. “Double Bind” Leads to GPT-5 Jailbreak: The AI That Was Convinced It Was Schizophrenic
  4. Hacker culture pioneer Peter Samson plays “Boards of Canada” on PDP-1
  5. F5 Suffers Security Breach: Source Code and Sensitive Data Stolen

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE