Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Cisco Talos has identified a new ransomware campaign called DeadLock : attackers are exploiting a vulnerable Baidu antivirus driver (CVE-2024-51324) to disable EDR systems using the Bring Your Own Vul...

What we wrote in the article ” Patriotic Code: from DDoSia and NoName057(16) to CISM, the algorithm that shapes youth for Putin ” on Red Hot Cyber on July 23rd is now fully consistent with the inf...

Gartner analysts have urged businesses to temporarily stop using browsers with built-in artificial intelligence (AI) capabilities . In a recent advisory, the company emphasizes that such tools pose un...

A critical vulnerability affecting the FortiOS, FortiWeb, FortiProxy , and FortiSwitchManager product lines has been reported by Fortinet via an urgent security advisory. This advisory was issued in c...

It seems the White House isn’t entirely clear … at least judging by yet another change of heart regarding the sale of Nvidia’s advanced chips to China, with the Trump administration having decid...
The Story of the First Keylogger: How Hidden Keyboard Control Came to Be
A Brief History of Malware: The Evolution of the Species from Its Origins to the Present Day
What Are Large Language Models? Behind the Scenes of Artificial Intelligence
Let’s discover the differences between a Machine Learning and Deep Learning algorithm
Hallucination in Artificial Intelligence: Between Strange and Disturbing Errors
How do machines learn? Let’s explore supervised, unsupervised, and reward learning approaches.

The Story of the First Keylogger: How Hidden Keyboard Control Came to Be
Redazione RHC - November 11th, 2025
We all know Bruce Schneier , a renowned cryptography and computer security expert, member of the board of directors of the International Association for Cryptological Research and a renowned speaker,...

A Brief History of Malware: The Evolution of the Species from Its Origins to the Present Day
Redazione RHC - November 11th, 2025
At first we talked about “viruses” , then “worms” appeared, followed by “macro viruses”. These were soon joined by other types of hostile software such as keyloggers or lockers. At...

What Are Large Language Models? Behind the Scenes of Artificial Intelligence
Marcello Politi - November 11th, 2025
In the rapidly evolving world of artificial intelligence (AI), one term has emerged with increasing importance: Language Model, especially large language models, then called Large Language Models. You've likely already...

Let’s discover the differences between a Machine Learning and Deep Learning algorithm
Marcello Politi - November 11th, 2025
In the world of artificial intelligence, we often hear two terms: machine learning (ML) and deep learning (DL). Both are methods for implementing AI through the training of machine learning...

Hallucination in Artificial Intelligence: Between Strange and Disturbing Errors
Simone Raponi - November 11th, 2025
Hallucinating, for a human, means perceiving things that aren't actually present in our environment. When we talk about "hallucinations" in artificial intelligence (AI), we're referring to a situation in which...

How do machines learn? Let’s explore supervised, unsupervised, and reward learning approaches.
Francesco Conti - November 11th, 2025
Artificial intelligence isn't about magic, it's about learning! This article aims to demystify the esotericism surrounding artificial intelligence (AI) by providing a comprehensive answer to the question , "How do...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

