Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
TM RedHotCyber 320x100 042514
TM RedHotCyber 970x120 042543

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Google Discover AI Headlines: Revolutionizing News Feed or Clickbait Nightmare? Cybercrime

Google Discover AI Headlines: Revolutionizing News Feed or Clickbait Nightmare?

Google is testing AI-generated headlines in its Discover feed, replacing original news headlines with original ones. Sean Hollister, editor-in-chief of...
Redazione RHC - 4 December 2025
Storm-0900 Phishing Campaign Spreads XWorm Malware Cybercrime

Storm-0900 Phishing Campaign Spreads XWorm Malware

Over the holiday season, a coordinated attack was detected and blocked by Microsoft Threat Intelligence security analysts, involving tens of...
Redazione RHC - 4 December 2025
Windows 10 Still Running on 1 Billion PCs, Upgrade to Windows 11 Urged Cybercrime

Windows 10 Still Running on 1 Billion PCs, Upgrade to Windows 11 Urged

Windows 10 has been officially retired, but it still runs on approximately one billion personal computers worldwide. A significant number...
Redazione RHC - 4 December 2025
Secure AI Integration in OT Systems: Key Principles and Best Practices Cybercrime

Secure AI Integration in OT Systems: Key Principles and Best Practices

Since ChatGPT's public release in November 2022, artificial intelligence (AI) has been integrated into many aspects of human society. For...
Redazione RHC - 4 December 2025
Aisuru Botnet Unleashes 29.7 Tbps DDoS Attack, Cloudflare Mitigates Cybercrime

Aisuru Botnet Unleashes 29.7 Tbps DDoS Attack, Cloudflare Mitigates

A botnet service called Aisuru offers an army of compromised IoT devices and routers to launch high-traffic DDoS attacks. In...
Redazione RHC - 3 December 2025
Critical Vulnerability in Iskra iHUB Devices Exposed Cybercrime

Critical Vulnerability in Iskra iHUB Devices Exposed

A serious security vulnerability has been discovered in smart metering infrastructure, which could expose utility networks to remote takeover risks....
Redazione RHC - 3 December 2025

Slammer, the first worm to use a bug that hasn’t been fixed for six months.

Many years have passed since the SQL Slammer worm spread uncontrollably on January 25, 2003. It was one of the fastest-spreading malware in history , and with this article we...
Share on Facebook Share on LinkedIn Share on X

The Story of the First Keylogger: How Hidden Keyboard Control Came to Be

We all know Bruce Schneier , a renowned cryptography and computer security expert, member of the board of directors of the International Association for Cryptological Research and a renowned speaker,...
Share on Facebook Share on LinkedIn Share on X

A Brief History of Malware: The Evolution of the Species from Its Origins to the Present Day

At first we talked about “viruses” , then “worms” appeared, followed by “macro viruses”. These were soon joined by other types of hostile software such as keyloggers or lockers. At...
Share on Facebook Share on LinkedIn Share on X

What Are Large Language Models? Behind the Scenes of Artificial Intelligence

In the rapidly evolving world of artificial intelligence (AI), one term has emerged with increasing importance: Language Model, especially large language models, then called Large Language Models. You've likely already...
Share on Facebook Share on LinkedIn Share on X

Let’s discover the differences between a Machine Learning and Deep Learning algorithm

In the world of artificial intelligence, we often hear two terms: machine learning (ML) and deep learning (DL). Both are methods for implementing AI through the training of machine learning...
Share on Facebook Share on LinkedIn Share on X

Hallucination in Artificial Intelligence: Between Strange and Disturbing Errors

Hallucinating, for a human, means perceiving things that aren't actually present in our environment. When we talk about "hallucinations" in artificial intelligence (AI), we're referring to a situation in which...
Share on Facebook Share on LinkedIn Share on X

How do machines learn? Let’s explore supervised, unsupervised, and reward learning approaches.

Artificial intelligence isn't about magic, it's about learning! This article aims to demystify the esotericism surrounding artificial intelligence (AI) by providing a comprehensive answer to the question , "How do...
Share on Facebook Share on LinkedIn Share on X

Difference between a classical algorithm and an AI software

In the digital age we live in, artificial intelligence (AI) is gaining increasing attention. But what distinguishes a classical algorithm from AI software? In this article, we'll explore the differences...
Share on Facebook Share on LinkedIn Share on X

What is a neural network? Discover the technology behind artificial intelligence.

In the contemporary technological landscape, one term stands out: neural network. The foundation of artificial intelligence, neural networks represent the future of how we interact with technology. But what exactly...
Share on Facebook Share on LinkedIn Share on X

Discovering Sandworm: The Kremlin’s National State Group

As we know, there are different types of cybercriminals. There are ethical hackers and criminal hackers. Within criminal hackers, there are a multitude of dimensions, including, specifically, nation-state-funded hacker groups...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
VoidLink Malware: Advanced Linux Framework Targets Cloud Infrastructures
Redazione RHC - 16/01/2026

Check Point researchers have discovered a new Linux infection framework distinguished by its advanced modular architecture and wide range of features. The malware has been dubbed VoidLink . The framework is composed of over 30…

Immagine del sitoCybercrime
Microsoft Copilot Vulnerability Exposes User Data to Hackers
Redazione RHC - 15/01/2026

A recently fixed vulnerability allowed attackers to exploit Microsoft Copilot Personal with a single click to steal sensitive user data. Using a phishing link, attackers were able to take control of sessions without requiring further…

Immagine del sitoCybercrime
Progress Software Patches LoadMaster, MOVEit WAF Vulnerabilities
Redazione RHC - 15/01/2026

On January 12, 2026, Progress Software Corporation released patches that address two high-severity Command Injection vulnerabilities, which could allow remote attackers to execute malicious code on LoadMaster load balancers and MOVEit Web Application Firewalls (WAFs).…

Immagine del sitoCybercrime
24-Year-Old Hacker Breaches US Supreme Court Database
Redazione RHC - 14/01/2026

Do you remember the 24-year-old hacker Carmelo Miano and the breaches of the Naples Prosecutor’s Office’s accounts and computer systems? It appears something similar happened in the United States, and the other young man is…

Immagine del sitoCybercrime
Cloudflare vs Italy: The Battle for Internet Freedom and DNS Control
Redazione RHC - 14/01/2026

Cloudflare CEO Matthew Prince has threatened to shut down the company’s operations in Italy after the country’s telecom regulator fined it twice its annual revenue in the country. The facts The conflict erupted around Italy’s…