Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Enterprise BusinessLog 320x200 1
970x20 Itcentric

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Microsoft’s new goal for artificial intelligence? Medicine!
Di Redazione RHC - 08/11/2025

The tech giant has announced the creation of a new development team for a “superhuman” artificial intelligence that will outperform human experts in medical diagnoses. The team will be led...

Immagine del sito
Artificial intelligence and security? What a tragedy!
Di Redazione RHC - 08/11/2025

A simple idea to simplify home network management and improve security unexpectedly turned into a series of near-catastrophic errors, all due to the advice of popular artificial intelligence assistant...

Immagine del sito
The most used password in 2025? It’s still “123456”! Humanity never learns.
Di Redazione RHC - 08/11/2025

In 2025, users still rely heavily on basic passwords to protect their accounts. A Comparitech study, based on an analysis of over 2 billion real passwords leaked to data breach forums over the course ...

Immagine del sito
China will overtake the US in the AI race! Nvidia CEO warns, “We’re stuck in cynicism.”
Di Redazione RHC - 07/11/2025

Nvidia CEO Jensen Huang has warned that China will defeat the United States in the artificial intelligence (AI) race. The FT reported that Huang, at the Future of AI Summit hosted by the Financial Tim...

Immagine del sito
Tesla wants to give Musk 1,000 billion dollars for a science fiction plan. More than the GDP of Switzerland!
Di Redazione RHC - 07/11/2025

Numerous accolades are pouring in for Elon Musk, who continues to deftly lead his empire’s multiple businesses, including Tesla, SpaceX, xAI, and Starlink , maintaining his firm hold on the top spot...

China dominates industrial robotics: 2 million machines in factories

China is consolidating its position as a global manufacturing powerhouse thanks to an unprecedented pace of production and installation of industrial ...
Redazione RHC - 12/10/2025 - 08:07

RDP Services Exposed in the Crosshairs! A Botnet of 100,000 IPs Scans the Network

In the United States, a large-scale, coordinated botnet campaign is targeting Remote Desktop Protocol (RDP)-based services. The scale and organization...
Redazione RHC - 11/10/2025 - 21:41

Everyone’s Hacking iPhones! Apple Increases iOS Reward to $5 Million

Apple has significantly expanded its bounty program for security vulnerabilities in the iOS ecosystem. At the Hexacon offensive security conference in...
Redazione RHC - 11/10/2025 - 18:40

Artificial intelligence = Alcohol for teens! It damages social and cognitive skills

Today's students are increasingly turning to artificial intelligence, not only for study aids, but also for social interaction and emotional support. ...
Redazione RHC - 11/10/2025 - 12:05

Velociraptor used in active attacks to distribute LockBit and Babuk ransomware

Hackers have begun using Velociraptor , the digital forensics and incident response (DFIR) tool, to launch LockBit and Babuk ransomware attacks. Cisco...
Redazione RHC - 11/10/2025 - 08:49

SonicWall confirms data breach. Cloud backup service customers at risk.

SonicWall confirmed that a data breach last month affected all customers using the company's cloud backup service. As a result, firewall configuration...
Redazione RHC - 11/10/2025 - 08:27
1 42 43 44 45 46 226

China dominates industrial robotics: 2 million machines in factories

- October 12th, 2025

China is consolidating its position as a global manufacturing powerhouse thanks to an unprecedented pace of production and installation of industrial robots. According to a report by the International Federation...

Facebook Linkedin X

RDP Services Exposed in the Crosshairs! A Botnet of 100,000 IPs Scans the Network

- October 11th, 2025

In the United States, a large-scale, coordinated botnet campaign is targeting Remote Desktop Protocol (RDP)-based services. The scale and organizational structure of this campaign poses a significant threat, especially for...

Facebook Linkedin X

Everyone’s Hacking iPhones! Apple Increases iOS Reward to $5 Million

- October 11th, 2025

Apple has significantly expanded its bounty program for security vulnerabilities in the iOS ecosystem. At the Hexacon offensive security conference in Paris, Ivan Krstic, the company's vice president of security...

Facebook Linkedin X

Artificial intelligence = Alcohol for teens! It damages social and cognitive skills

- October 11th, 2025

Today's students are increasingly turning to artificial intelligence, not only for study aids, but also for social interaction and emotional support. A new study from the Center for Democracy and...

Facebook Linkedin X

Velociraptor used in active attacks to distribute LockBit and Babuk ransomware

- October 11th, 2025

Hackers have begun using Velociraptor , the digital forensics and incident response (DFIR) tool, to launch LockBit and Babuk ransomware attacks. Cisco Talos researchers attribute these campaigns to the Storm-2603...

Facebook Linkedin X

SonicWall confirms data breach. Cloud backup service customers at risk.

- October 11th, 2025

SonicWall confirmed that a data breach last month affected all customers using the company's cloud backup service. As a result, firewall configurations stored on MySonicWall were compromised. MySonicWall is a...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE