Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Mobile
Banner Ancharia Desktop 1 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Sam Altman and her husband Oliver and the dream of genetically modified children
Di Redazione RHC - 16/11/2025

The pursuit of immortality is a pervasive obsession in Silicon Valley. Likewise, the idea of perfecting children through genetic modification is another. Sam Altman, the man who brought artificial int...

Immagine del sito
Virtual Private Network (VPN): What It Is, How It Works, and Why
Di Redazione RHC - 15/11/2025

A VPN , short for Virtual Private Network, is a system that allows you to establish a secure and private connection over a public network, such as the Internet . In practice, it creates what is called...

Immagine del sito
Password Managers: A Complete Guide to Choosing and Using Them
Di Redazione RHC - 15/11/2025

Passwords: how important are they in our digital lives? How many times have we reported this on our pages? Most digital activities— from social media to banking to online shopping —require unique ...

Immagine del sito
Discovering the NIS2 Directive: Security and Resilience of Digital Systems in the European Union
Di Riccardo Nuti - 15/11/2025

On 10 November 2022, the European Parliament, by a large majority, approved the NIS2 (Network and Information System Security) Directive with its publication in the Official Journal of the European Un...

Immagine del sito
Kraken Arrives: The New Ransomware That Assesses Your Environment to Inflict Maximum Damage
Di Redazione RHC - 15/11/2025

Cisco Talos researchers have detected an active wave of attacks using a new ransomware called Kraken. The group began operating in February 2025 and uses double-extortion methods, without targeting sp...

Hackers can access Microsoft Teams chats and emails using access tokens

A recent discovery has revealed that hackers can exploit a flaw in Microsoft Teams on Windows to obtain encrypted authentication tokens , which grant ...
Redazione RHC - 24/10/2025 - 08:02

FIA website hacked: personal data of Max Verstappen and over 7,000 drivers exposed

Security researchers have discovered vulnerabilities in an FIA website that contained sensitive personal information and documents relating to drivers...
Redazione RHC - 24/10/2025 - 07:41

Microsoft Edge protects Internet Explorer mode from attacks

The Microsoft Edge security team made significant changes to Internet Explorer mode after receiving confirmation of targeted attacks using it. Experts...
Redazione RHC - 24/10/2025 - 07:27

Canada’s craft beer competition ends in chaos over AI judges

A major Canadian craft beer competition has become the center of controversy after unexpectedly introducing artificial intelligence into the beverage ...
Redazione RHC - 24/10/2025 - 07:13

Artificial General Intelligence (AGI): the first global standard for measuring it has been defined

On October 21, 2025, an international team of researchers from 29 leading institutions—including Stanford University, MIT, and the University of Calif...
Redazione RHC - 23/10/2025 - 20:59

$2.5 billion: The cost of the Jaguar Land Rover cyber attack.

Jaguar Land Rover continues to deal with the fallout from the cyber attack that paralyzed production, disrupted its dealer network, and jeopardized su...
Redazione RHC - 23/10/2025 - 18:35
1 40 41 42 43 44 242

Hackers can access Microsoft Teams chats and emails using access tokens

- October 24th, 2025

A recent discovery has revealed that hackers can exploit a flaw in Microsoft Teams on Windows to obtain encrypted authentication tokens , which grant unauthorized access to chats, emails, and...

Facebook Linkedin X

FIA website hacked: personal data of Max Verstappen and over 7,000 drivers exposed

- October 24th, 2025

Security researchers have discovered vulnerabilities in an FIA website that contained sensitive personal information and documents relating to drivers, including world champion Max Verstappen. Ian Carroll, one of three researchers...

Facebook Linkedin X

Microsoft Edge protects Internet Explorer mode from attacks

- October 24th, 2025

The Microsoft Edge security team made significant changes to Internet Explorer mode after receiving confirmation of targeted attacks using it. Experts discovered that attackers exploited vulnerabilities in the outdated Chakra...

Facebook Linkedin X

Canada’s craft beer competition ends in chaos over AI judges

- October 24th, 2025

A major Canadian craft beer competition has become the center of controversy after unexpectedly introducing artificial intelligence into the beverage judging process. The decision to integrate algorithms without warning sparked...

Facebook Linkedin X

Artificial General Intelligence (AGI): the first global standard for measuring it has been defined

- October 23rd, 2025

On October 21, 2025, an international team of researchers from 29 leading institutions—including Stanford University, MIT, and the University of California, Berkeley —completed a study that marks a milestone in...

Facebook Linkedin X

$2.5 billion: The cost of the Jaguar Land Rover cyber attack.

- October 23rd, 2025

Jaguar Land Rover continues to deal with the fallout from the cyber attack that paralyzed production, disrupted its dealer network, and jeopardized supply chains. Vehicle production at major UK plants...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE