Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
UtiliaCS 320x100
TM RedHotCyber 970x120 042543

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
ChatGPT buys me bread! Atlas, the smart browser for macOS, is here.
Di Redazione RHC - 22/10/2025

OpenAI has released the ChatGPT Atlas browser for macOS. It integrates artificial intelligence directly into the interface and can perform tasks on web pages without having to switch between tabs. Atl...

Immagine del sito
F5 BIG-IP Vulnerability: 266,000 Devices at Risk Worldwide! 2,500 in Italy
Di Redazione RHC - 20/10/2025

The Cybersecurity and Infrastructure Security Agency (CISA) and the Multi-State Information Sharing & Analysis Center (MS-ISAC) are issuing this Joint Cybersecurity Advisory (CSA) in response to t...

Immagine del sito
The Intel 386 processor turns 40: the 32-bit era began
Di Redazione RHC - 20/10/2025

October 20, 2025, marks a significant anniversary in the history of computing: the Intel 80386 processor, also known as the i386 , celebrates its 40th birthday . And it’s a big birthday! Launche...

Immagine del sito
Intel releases urgent patches for new Spectre variant
Di Redazione RHC - 19/10/2025

VUSec researchers have presented a paper titled “Training Solo,” which challenges the fundamental principles of protection against Spectre-v2 attacks. Previously , the domain isolation mec...

Immagine del sito
Famous hackers: Vladimir Levin and the first online bank robbery.
Di Redazione RHC - 18/10/2025

Today we’ll meet another hacker from the past. He’s Vladimir Levin, a Russian hacker from St. Petersburg (Владимир Леонидович Левин), who became famous for breaking ...

GitHub strengthens npm security against supply chain attacks.

GitHub has announced major changes to its npm authentication and publishing system, aimed at strengthening protection against supply chain attacks. Th...
Redazione RHC - 24/09/2025 - 07:16

Towards AGI: Google DeepMind warns, AI could ignore humans

Google DeepMind researchers have released an updated version of their AI risk assessment framework, Frontier Safety Framework 3.0 . This paper examine...
Redazione RHC - 24/09/2025 - 07:12

From Debugging to Breaking: Turning Crash Dumps into EDR Kill Switches

I have been working for several years as a System Engineer, and one of the tasks I handled was managing Citrix PVS. One of the issues with PVS was inv...
Alex Necula - 24/09/2025 - 07:07

RAN Hacking: US Intelligence Uncovers Clandestine Cellular Network in New York

U.S. intelligence agencies have reported discovering and seizing a network of telecommunications equipment in the New York area capable of disrupting ...
Redazione RHC - 23/09/2025 - 20:34

Chrome for Android: From a “wall of text” to a podcast is a short step.

Google has added a new AI-powered feature to Chrome for Android for reading web pages. Instead of reading the entire text aloud, the browser can summa...
Redazione RHC - 23/09/2025 - 17:00

Developers safe: Mozilla introduces Firefox extension rollback feature.

Mozilla has introduced a new feature for Firefox add-on developers that allows them to quickly revert to a previously approved version and fix critica...
Redazione RHC - 23/09/2025 - 16:50
1 43 44 45 46 47 201

GitHub strengthens npm security against supply chain attacks.

- September 24th, 2025

GitHub has announced major changes to its npm authentication and publishing system, aimed at strengthening protection against supply chain attacks. The updates were prompted by the recent Shai-Hulud campaign, a...

Facebook Linkedin X

Towards AGI: Google DeepMind warns, AI could ignore humans

- September 24th, 2025

Google DeepMind researchers have released an updated version of their AI risk assessment framework, Frontier Safety Framework 3.0 . This paper examines how generative models can run amok and pose...

Facebook Linkedin X

From Debugging to Breaking: Turning Crash Dumps into EDR Kill Switches

- September 24th, 2025

I have been working for several years as a System Engineer, and one of the tasks I handled was managing Citrix PVS. One of the issues with PVS was investigating...

Facebook Linkedin X

RAN Hacking: US Intelligence Uncovers Clandestine Cellular Network in New York

- September 23rd, 2025

U.S. intelligence agencies have reported discovering and seizing a network of telecommunications equipment in the New York area capable of disrupting mobile phone service. The devices were located near the...

Facebook Linkedin X

Chrome for Android: From a “wall of text” to a podcast is a short step.

- September 23rd, 2025

Google has added a new AI-powered feature to Chrome for Android for reading web pages. Instead of reading the entire text aloud, the browser can summarize the material in a...

Facebook Linkedin X

Developers safe: Mozilla introduces Firefox extension rollback feature.

- September 23rd, 2025

Mozilla has introduced a new feature for Firefox add-on developers that allows them to quickly revert to a previously approved version and fix critical issues in situations where fixing and...

Facebook Linkedin X
Most Read Articles of the Month Most Read Articles of the Week
  1. The Truth About Windows XP License Key: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8
  2. Computer science graduates with no future! Thousands of resumes ignored, and goodbye to six-figure salaries.
  3. With 50 dollars and physical access to the server, the Cloud goes to hell
  4. Google Announces Gemini 3.0: Artificial Intelligence Evolves Toward AGI
  5. Shocking collapse: -71% of job offers for software engineers in three years
  1. Google Announces Gemini 3.0: Artificial Intelligence Evolves Toward AGI
  2. Google launches Gemini 3.0 Pro: new multimodal language model
  3. NIS2 and new ACN guidelines: what changes for companies and how to prepare
  4. Critical vulnerability in Windows SMB client: CISA raises alarm
  5. ChatGPT writes the perfect scam… but the scammer leaves the AI instructions inside.

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE