Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
320×100
Enterprise BusinessLog 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Google is ready to launch Gemini 3.0: will it really be the turning point in the AI race?
Di Redazione RHC - 16/11/2025

Google is getting closer to the official unveiling of Gemini 3.0 , the new artificial intelligence model destined to represent one of the most significant steps in the company’s strategy. According ...

Immagine del sito
The Louvre was deceived by two Belgian pranksters! They hung their painting next to the Mona Lisa.
Di Redazione RHC - 16/11/2025

Louvre security is under fire again after pranksters managed to trick guards and hang their painting in the same room as the Mona Lisa. Belgian duo Neel and Senne gained online notoriety by smuggling ...

Immagine del sito
Sam Altman and her husband Oliver and the dream of genetically modified children
Di Redazione RHC - 16/11/2025

The pursuit of immortality is a pervasive obsession in Silicon Valley. Likewise, the idea of perfecting children through genetic modification is another. Sam Altman, the man who brought artificial int...

Immagine del sito
Virtual Private Network (VPN): What It Is, How It Works, and Why
Di Redazione RHC - 15/11/2025

A VPN , short for Virtual Private Network, is a system that allows you to establish a secure and private connection over a public network, such as the Internet . In practice, it creates what is called...

Immagine del sito
Password Managers: A Complete Guide to Choosing and Using Them
Di Redazione RHC - 15/11/2025

Passwords: how important are they in our digital lives? How many times have we reported this on our pages? Most digital activities— from social media to banking to online shopping —require unique ...

A “hacked” water system: hacktivism becomes digital propaganda

In September, Forescout specialists detected a targeted attack on their honeypot server, which mimicked the control system of a water treatment plant....
Redazione RHC - 24/10/2025 - 09:57

Russia and Cybercrime: A Balance Between Selective Repression and State Interest

The Russian cybercrime ecosystem has entered a phase of profound transformation, triggered by a combination of factors: unprecedented international pr...
Ada Spinelli - 24/10/2025 - 09:22

Hackers can access Microsoft Teams chats and emails using access tokens

A recent discovery has revealed that hackers can exploit a flaw in Microsoft Teams on Windows to obtain encrypted authentication tokens , which grant ...
Redazione RHC - 24/10/2025 - 08:02

FIA website hacked: personal data of Max Verstappen and over 7,000 drivers exposed

Security researchers have discovered vulnerabilities in an FIA website that contained sensitive personal information and documents relating to drivers...
Redazione RHC - 24/10/2025 - 07:41

Microsoft Edge protects Internet Explorer mode from attacks

The Microsoft Edge security team made significant changes to Internet Explorer mode after receiving confirmation of targeted attacks using it. Experts...
Redazione RHC - 24/10/2025 - 07:27

Canada’s craft beer competition ends in chaos over AI judges

A major Canadian craft beer competition has become the center of controversy after unexpectedly introducing artificial intelligence into the beverage ...
Redazione RHC - 24/10/2025 - 07:13
1 40 41 42 43 44 243

A “hacked” water system: hacktivism becomes digital propaganda

- October 24th, 2025

In September, Forescout specialists detected a targeted attack on their honeypot server, which mimicked the control system of a water treatment plant. A new hacktivist group, TwoNet , operating in...

Facebook Linkedin X

Russia and Cybercrime: A Balance Between Selective Repression and State Interest

- October 24th, 2025

The Russian cybercrime ecosystem has entered a phase of profound transformation, triggered by a combination of factors: unprecedented international pressure from law enforcement agencies, a shift in domestic priorities, and...

Facebook Linkedin X

Hackers can access Microsoft Teams chats and emails using access tokens

- October 24th, 2025

A recent discovery has revealed that hackers can exploit a flaw in Microsoft Teams on Windows to obtain encrypted authentication tokens , which grant unauthorized access to chats, emails, and...

Facebook Linkedin X

FIA website hacked: personal data of Max Verstappen and over 7,000 drivers exposed

- October 24th, 2025

Security researchers have discovered vulnerabilities in an FIA website that contained sensitive personal information and documents relating to drivers, including world champion Max Verstappen. Ian Carroll, one of three researchers...

Facebook Linkedin X

Microsoft Edge protects Internet Explorer mode from attacks

- October 24th, 2025

The Microsoft Edge security team made significant changes to Internet Explorer mode after receiving confirmation of targeted attacks using it. Experts discovered that attackers exploited vulnerabilities in the outdated Chakra...

Facebook Linkedin X

Canada’s craft beer competition ends in chaos over AI judges

- October 24th, 2025

A major Canadian craft beer competition has become the center of controversy after unexpectedly introducing artificial intelligence into the beverage judging process. The decision to integrate algorithms without warning sparked...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE