Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Crowdstrike 320×100
Enterprise BusinessLog 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
New York sues Facebook, Instagram, TikTok, and YouTube over youth mental health crises
Di Redazione RHC - 09/11/2025

The City of New York filed a lawsuit on Wednesday against a group of prominent social media platforms, including TikTok, YouTube, Instagram, and Facebook, accusing them of contributing to a mental hea...

Immagine del sito
Microsoft’s new goal for artificial intelligence? Medicine!
Di Redazione RHC - 08/11/2025

The tech giant has announced the creation of a new development team for a “superhuman” artificial intelligence that will outperform human experts in medical diagnoses. The team will be led...

Immagine del sito
Artificial intelligence and security? What a tragedy!
Di Redazione RHC - 08/11/2025

A simple idea to simplify home network management and improve security unexpectedly turned into a series of near-catastrophic errors, all due to the advice of popular artificial intelligence assistant...

Immagine del sito
The most used password in 2025? It’s still “123456”! Humanity never learns.
Di Redazione RHC - 08/11/2025

In 2025, users still rely heavily on basic passwords to protect their accounts. A Comparitech study, based on an analysis of over 2 billion real passwords leaked to data breach forums over the course ...

Immagine del sito
China will overtake the US in the AI race! Nvidia CEO warns, “We’re stuck in cynicism.”
Di Redazione RHC - 07/11/2025

Nvidia CEO Jensen Huang has warned that China will defeat the United States in the artificial intelligence (AI) race. The FT reported that Huang, at the Future of AI Summit hosted by the Financial Tim...

Satellites targeted! Thousands of phone conversations and text messages intercepted.

Satellite communications links used by government agencies, the military, businesses, and mobile operators have been discovered to be the source of a ...
Redazione RHC - 14/10/2025 - 12:44

Internet Explorer is “dead,” but it continues to infect PCs with its bugs via Edge

While Internet Explorer has officially been out of support since June 2022, Microsoft recently faced a threat that exploited Internet Explorer Mode (I...
Luca Galuppi - 14/10/2025 - 12:20

Nanochat: Create your own LLM, train it, and get it running on your PC for $100

Developer Andrej Karpathy has unveiled nanochat , a minimalist, fully open-source version of ChatGPT that can be trained and run on a single computer....
Redazione RHC - 14/10/2025 - 09:38

Jeff Bezos at Italian Tech Week: “Millions of people will live in space.”

Data centers in space, lunar landers, Martian missions: the future designed by Bezos in Turin. But the real revelation is the anecdote about his grand...
Carlo Denza - 14/10/2025 - 07:25

WhatsApp Web in the crosshairs! How the worm that distributes the banking Trojan works

Sophos analysts have discovered a complex malware operation by security experts that uses the popular messaging service WhatsApp to spread banking Tro...
Redazione RHC - 14/10/2025 - 07:20

Goodbye Microsoft Word. China chooses WPS Office for official documents

China continues to pursue technological independence, and this time the signal has come not from microchip manufacturers, but from government official...
Redazione RHC - 14/10/2025 - 07:05
1 39 40 41 42 43 226

Satellites targeted! Thousands of phone conversations and text messages intercepted.

- October 14th, 2025

Satellite communications links used by government agencies, the military, businesses, and mobile operators have been discovered to be the source of a massive data leak. Researchers at the University of...

Facebook Linkedin X

Internet Explorer is “dead,” but it continues to infect PCs with its bugs via Edge

- October 14th, 2025

While Internet Explorer has officially been out of support since June 2022, Microsoft recently faced a threat that exploited Internet Explorer Mode (IE Mode) in Edge , which was designed...

Facebook Linkedin X

Nanochat: Create your own LLM, train it, and get it running on your PC for $100

- October 14th, 2025

Developer Andrej Karpathy has unveiled nanochat , a minimalist, fully open-source version of ChatGPT that can be trained and run on a single computer. Designed as a learning platform for...

Facebook Linkedin X

Foto: Ufficio Stampa Italian Tech Wee

Jeff Bezos at Italian Tech Week: “Millions of people will live in space.”

- October 14th, 2025

Data centers in space, lunar landers, Martian missions: the future designed by Bezos in Turin. But the real revelation is the anecdote about his grandfather that reveals his human profile....

Facebook Linkedin X

WhatsApp Web in the crosshairs! How the worm that distributes the banking Trojan works

- October 14th, 2025

Sophos analysts have discovered a complex malware operation by security experts that uses the popular messaging service WhatsApp to spread banking Trojans, targeting Brazilian banks and cryptocurrency exchanges. A self-replicating...

Facebook Linkedin X

Goodbye Microsoft Word. China chooses WPS Office for official documents

- October 14th, 2025

China continues to pursue technological independence, and this time the signal has come not from microchip manufacturers, but from government officials. For the first time, the Chinese Ministry of Commerce...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE