Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The recent 2025.4 release of Kali Linux has been made available to the public, introducing significant improvements to the GNOME, KDE, and Xfce desktop environments . From now on, Wayland will be the ...

An alleged database containing sensitive information on 18 million U.S. citizens over 65 has appeared for sale on a popular dark web forum. The advertiser, who uses the pseudonym “Frenshyny,” clai...

A recent study by Datadog Security Labs reveals an ongoing operation targeting organizations using Microsoft 365 and Okta for single sign-on (SSO) authentication. This operation uses sophisticated tec...

The React Server component security saga continues this week. Following the patching of a critical remote code execution (RCE) vulnerability that led to React2shell, researchers have discovered two ne...

Cisco Talos has identified a new ransomware campaign called DeadLock : attackers are exploiting a vulnerable Baidu antivirus driver (CVE-2024-51324) to disable EDR systems using the Bring Your Own Vul...
The Story of the First Keylogger: How Hidden Keyboard Control Came to Be
A Brief History of Malware: The Evolution of the Species from Its Origins to the Present Day
What Are Large Language Models? Behind the Scenes of Artificial Intelligence
Let’s discover the differences between a Machine Learning and Deep Learning algorithm
Hallucination in Artificial Intelligence: Between Strange and Disturbing Errors
How do machines learn? Let’s explore supervised, unsupervised, and reward learning approaches.

The Story of the First Keylogger: How Hidden Keyboard Control Came to Be
Redazione RHC - November 11th, 2025
We all know Bruce Schneier , a renowned cryptography and computer security expert, member of the board of directors of the International Association for Cryptological Research and a renowned speaker,...

A Brief History of Malware: The Evolution of the Species from Its Origins to the Present Day
Redazione RHC - November 11th, 2025
At first we talked about “viruses” , then “worms” appeared, followed by “macro viruses”. These were soon joined by other types of hostile software such as keyloggers or lockers. At...

What Are Large Language Models? Behind the Scenes of Artificial Intelligence
Marcello Politi - November 11th, 2025
In the rapidly evolving world of artificial intelligence (AI), one term has emerged with increasing importance: Language Model, especially large language models, then called Large Language Models. You've likely already...

Let’s discover the differences between a Machine Learning and Deep Learning algorithm
Marcello Politi - November 11th, 2025
In the world of artificial intelligence, we often hear two terms: machine learning (ML) and deep learning (DL). Both are methods for implementing AI through the training of machine learning...

Hallucination in Artificial Intelligence: Between Strange and Disturbing Errors
Simone Raponi - November 11th, 2025
Hallucinating, for a human, means perceiving things that aren't actually present in our environment. When we talk about "hallucinations" in artificial intelligence (AI), we're referring to a situation in which...

How do machines learn? Let’s explore supervised, unsupervised, and reward learning approaches.
Francesco Conti - November 11th, 2025
Artificial intelligence isn't about magic, it's about learning! This article aims to demystify the esotericism surrounding artificial intelligence (AI) by providing a comprehensive answer to the question , "How do...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

