Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Cyber Offensive Fundamentals 320x200 1
TM RedHotCyber 970x120 042543

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Be careful when using SSDs! Without power, you risk data loss Cybercrime

Be careful when using SSDs! Without power, you risk data loss

XDA Developers reminds us that using solid-state drives for long-term storage is risky. If SSDs are left without power for...
Redazione RHC - 27 November 2025
Quantum Computing vs. Artificial Intelligence: Which Will Really Change the Future? Cybercrime

Quantum Computing vs. Artificial Intelligence: Which Will Really Change the Future?

Quantum mechanics remains a complex and mysterious field, both difficult to explain and difficult to understand. This branch of physics...
Redazione RHC - 27 November 2025
ToddyCat APT Group Targets Microsoft 365 Email Security Cybercrime

ToddyCat APT Group Targets Microsoft 365 Email Security

Email security continues to be one of the most critical points in modern cyber attacks. While compromising a Windows domain...
Redazione RHC - 27 November 2025
Tor Boosts Security with Counter Galois Onion CGO Encryption Cybercrime

Tor Boosts Security with Counter Galois Onion CGO Encryption

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to...
Redazione RHC - 27 November 2025
WormGPT 4: AI-Powered Cybercrime Tools on the Rise Cybercrime

WormGPT 4: AI-Powered Cybercrime Tools on the Rise

Cybercriminals no longer need to convince ChatGPT or Claude Code to write malware or data-stealing scripts. A whole class of...
Redazione RHC - 26 November 2025
EU lawmakers push for Microsoft alternative to boost tech sovereignty Cybercrime

EU lawmakers push for Microsoft alternative to boost tech sovereignty

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and...
Redazione RHC - 26 November 2025
Tecno-ottimismo VS potere del controllo IA

Techno-optimism vs. the power of control: are we the greatest threat from AI?

Imagine a futuristic city split in half: on one side, glittering towers of innovation; on the other, chaos and the shadows of lost control. This isn't a dystopian vision, but...
Share on Facebook Share on LinkedIn Share on X

Google Gemini 3.0: New features and updates for the year’s most anticipated AI assistant

Over the past week, Google announced that the Gemini Assistant can now natively integrate YouTube and Google Maps services without the need to use specific commands like "@YouTube" or "@Google...
Share on Facebook Share on LinkedIn Share on X

Domestic robots and privacy: the hidden price of the automated future

The home of the future is full of robots. Automated laundries, personal assistants, and small electronic housekeepers are all devices designed to free up precious time and make domestic life...
Share on Facebook Share on LinkedIn Share on X

The tale of the Mayor who thought of banning axes… but then came the Saws

Once upon a time, there was a town that had a Magical Forest. It was happy to have it, even a little proud. Which is why all the citizens willingly...
Share on Facebook Share on LinkedIn Share on X

WhatsApp used to spread LANDFALL, the new spyware for Android Samsung

Researchers at Palo Alto Networks Unit 42 have discovered a new, previously unknown family of Android spyware called LANDFALL . To spread it, malicious actors exploited a zero-day vulnerability (CVE-2025-21042)...
Share on Facebook Share on LinkedIn Share on X

Trump and Kim Jong Un summit? There seems to be a high probability of a meeting.

South Korean intelligence agencies , including the National Intelligence Service, reportedly believe there is a high probability that US President Donald Trump will hold a summit with North Korean Workers'...
Share on Facebook Share on LinkedIn Share on X

New York sues Facebook, Instagram, TikTok, and YouTube over youth mental health crises

The City of New York filed a lawsuit on Wednesday against a group of prominent social media platforms, including TikTok, YouTube, Instagram, and Facebook, accusing them of contributing to a...
Share on Facebook Share on LinkedIn Share on X

Sam Altman: “I hope that bad things don’t happen because of technology.”

The latest statements by Sam Altman, CEO of OpenAI, regarding the progress of artificial intelligence (AI) are not very encouraging, as he recently stated that he is concerned about "the...
Share on Facebook Share on LinkedIn Share on X

Microsoft’s new goal for artificial intelligence? Medicine!

The tech giant has announced the creation of a new development team for a "superhuman" artificial intelligence that will outperform human experts in medical diagnoses. The team will be led...
Share on Facebook Share on LinkedIn Share on X

Artificial intelligence and security? What a tragedy!

A simple idea to simplify home network management and improve security unexpectedly turned into a series of near-catastrophic errors, all due to the advice of popular artificial intelligence assistants. Instead...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
DevSecOps: Integrating Security into Your Development Process
Massimiliano Brolli - 07/01/2026

When it comes to application security, there’s rarely a single problem. It’s almost always a chain of small flaws, poor decisions, and missing controls that, when added together, pave the way for serious incidents. This…

Immagine del sitoCybercrime
WhatsApp Device Fingerprinting: New Measures Against Privacy Threats
Redazione RHC - 06/01/2026

WhatsApp, Meta’s messaging app with over 3 billion monthly active users, has begun introducing technical changes to mitigate several privacy vulnerabilities on user devices . The fixes, identified through independent research tools, were implemented without…

Immagine del sitoCybercrime
PS5 BootROM Key Leaked, Sony’s Security Compromised
Redazione RHC - 05/01/2026

A recent incident saw an anonymous hacker leak a crucial security key used by Sony to safeguard the integrity of the chain of trust in the PlayStation 5 console. This security key, known as the…

Immagine del sitoCybercrime
Windows 11 Performance Test: Surprising Results with Windows 8.1
Redazione RHC - 05/01/2026

A comparison test across six generations of Windows was conducted by YouTube channel TrigrZolt , which unexpectedly revealed a clear winner: Windows 8.1. Windows 11, on the other hand, performed worst in almost every test.…

Immagine del sitoCulture
Long-Lived Technologies: COBOL, C, SQL, and Legacy Systems
Redazione RHC - 02/01/2026

While the industry debates which neural network is the “smartest” and which framework is the “most modern,” decades-old technologies continue to quietly swirl beneath the surface of the banking industry . This year, COBOL turned…