Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Fortinet 320x100px
2nd Edition GlitchZone RHC 970x120 1 Scaled

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Artificial General Intelligence (AGI): the first global standard for measuring it has been defined
Di Redazione RHC - 23/10/2025

On October 21, 2025, an international team of researchers from 29 leading institutions—including Stanford University, MIT, and the University of California, Berkeley —completed a study that marks ...

Immagine del sito
ChatGPT buys me bread! Atlas, the smart browser for macOS, is here.
Di Redazione RHC - 22/10/2025

OpenAI has released the ChatGPT Atlas browser for macOS. It integrates artificial intelligence directly into the interface and can perform tasks on web pages without having to switch between tabs. Atl...

Immagine del sito
F5 BIG-IP Vulnerability: 266,000 Devices at Risk Worldwide! 2,500 in Italy
Di Redazione RHC - 20/10/2025

The Cybersecurity and Infrastructure Security Agency (CISA) and the Multi-State Information Sharing & Analysis Center (MS-ISAC) are issuing this Joint Cybersecurity Advisory (CSA) in response to t...

Immagine del sito
The Intel 386 processor turns 40: the 32-bit era began
Di Redazione RHC - 20/10/2025

October 20, 2025, marks a significant anniversary in the history of computing: the Intel 80386 processor, also known as the i386 , celebrates its 40th birthday . And it’s a big birthday! Launche...

Immagine del sito
Intel releases urgent patches for new Spectre variant
Di Redazione RHC - 19/10/2025

VUSec researchers have presented a paper titled “Training Solo,” which challenges the fundamental principles of protection against Spectre-v2 attacks. Previously , the domain isolation mec...

The freebie party is over! Open source infrastructure is at risk and needs funding.

An open letter signed by major open source foundations has raised the alarm about the future of the infrastructure that supports modern software devel...
Redazione RHC - 25/09/2025 - 07:47

Zero-Day Vulnerabilities Found in Cisco IOS and IOS XE: Urgent Updates

Cisco has disclosed a zero-day vulnerability, tracked as CVE-2025-20352, in its widely used IOS and IOS XE software; this vulnerability appears to be ...
Redazione RHC - 25/09/2025 - 07:31

Artificial Intelligence: A Double-Edged Sword in Digital Security

Artificial intelligence is increasingly being described as a double-edged sword, capable of offering enormous advantages but also opening new avenues ...
Redazione RHC - 25/09/2025 - 07:04

Kali Linux 2025.3 is out! A new release with improvements and new tools.

Kali Linux developers have released a new release, 2025.3 , which expands the distribution's functionality and adds ten new penetration testing tools....
Redazione RHC - 24/09/2025 - 21:14

CrowdStrike: Cybersecurity Enters the Age of AI Agents

At Fal.Con 2025, the annual conference that brings together thousands of cybersecurity experts from around the world, CrowdStrike made one thing clear...
Marcello Filacchioni - 24/09/2025 - 18:05

Critical bug in Salesforce CLI: Arbitrary code execution and SYSTEM access

A critical vulnerability in the Salesforce CLI installer (sf-x64.exe) allows attackers to gain arbitrary code execution, privilege escalation, and SYS...
Redazione RHC - 24/09/2025 - 17:17
1 42 43 44 45 46 202

The freebie party is over! Open source infrastructure is at risk and needs funding.

- September 25th, 2025

An open letter signed by major open source foundations has raised the alarm about the future of the infrastructure that supports modern software development. The Open Source Security Foundation (OpenSSF),...

Facebook Linkedin X

Zero-Day Vulnerabilities Found in Cisco IOS and IOS XE: Urgent Updates

- September 25th, 2025

Cisco has disclosed a zero-day vulnerability, tracked as CVE-2025-20352, in its widely used IOS and IOS XE software; this vulnerability appears to be actively exploited. This vulnerability was initially identified...

Facebook Linkedin X

Artificial Intelligence: A Double-Edged Sword in Digital Security

- September 25th, 2025

Artificial intelligence is increasingly being described as a double-edged sword, capable of offering enormous advantages but also opening new avenues for digital crime. During the " TRUST AICS - 2025"...

Facebook Linkedin X

Kali Linux 2025.3 is out! A new release with improvements and new tools.

- September 24th, 2025

Kali Linux developers have released a new release, 2025.3 , which expands the distribution's functionality and adds ten new penetration testing tools. The update improves deployment processes in virtual environments,...

Facebook Linkedin X

CrowdStrike: Cybersecurity Enters the Age of AI Agents

- September 24th, 2025

At Fal.Con 2025, the annual conference that brings together thousands of cybersecurity experts from around the world, CrowdStrike made one thing clear: cyber defense is entering a new era, that...

Facebook Linkedin X

Critical bug in Salesforce CLI: Arbitrary code execution and SYSTEM access

- September 24th, 2025

A critical vulnerability in the Salesforce CLI installer (sf-x64.exe) allows attackers to gain arbitrary code execution, privilege escalation, and SYSTEM-level access on Windows systems. The vulnerability exploits the way the...

Facebook Linkedin X
Most Read Articles of the Month Most Read Articles of the Week
  1. The Truth About Windows XP License Key: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8
  2. Google launches Gemini 3.0 Pro: new multimodal language model
  3. Computer science graduates with no future! Thousands of resumes ignored, and goodbye to six-figure salaries.
  4. Google Announces Gemini 3.0: Artificial Intelligence Evolves Toward AGI
  5. With 50 dollars and physical access to the server, the Cloud goes to hell
  1. Google launches Gemini 3.0 Pro: new multimodal language model
  2. Google Announces Gemini 3.0: Artificial Intelligence Evolves Toward AGI
  3. Critical vulnerability in Windows SMB client: CISA raises alarm
  4. NIS2 and new ACN guidelines: what changes for companies and how to prepare
  5. ChatGPT writes the perfect scam… but the scammer leaves the AI instructions inside.

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE