Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Crowdstrike 320×100
Banner Ancharia Desktop 1 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

Immagine del sito
Anthropic Releases Claude Opus 4.5: AI Model for Enhanced Productivity
Di Redazione RHC - 24/11/2025

Anthropic has released Claude Opus 4.5 , its new flagship model, which the company says is the most powerful version yet and ranks at the top of the class for practical programming, agent-based produc...

Immagine del sito
Alibaba Qwen3Max Dominates AI Market with Rapid Growth
Di Redazione RHC - 24/11/2025

On November 24, Alibaba announced Qwen3Max, which had been in public beta for a week , and had already surpassed 10 million downloads. It was a record that shattered all others. In a very short time, ...

Immagine del sito
Digital Surveillance at Work: The Rise of Algorithmic Monitoring
Di Redazione RHC - 24/11/2025

Remote work has given employees freedom , but with it has also come digital surveillance . We discussed this some time ago in an article, reporting that these monitoring tools are also coming to Micro...

Cyber Incident Management in the NIS2 Era

The NIS 2 Decree (Legislative Decree 138/2024), effective October 16, 2024, implements the principles of the European NIS2 Directive, laying the found...
Giancarlo Di Lieto - 30/10/2025 - 07:21

US builds largest AI supercomputer in history

The U.S. Department of Energy (DOE) has entered into a strategic collaboration with Nvidia and Oracle to build seven next-generation AI-powered superc...
Redazione RHC - 30/10/2025 - 07:01

Microsoft 365 goes down: DNS anomaly paralyzes services worldwide

A DNS service outage was detected by Microsoft on October 29, 2025, impacting access to critical services such as Microsoft Azure and Microsoft 365. A...
Redazione RHC - 29/10/2025 - 21:34

Tor Browser Says No to Artificial Intelligence! Security Comes First

Interestingly, while major companies like Microsoft and Google are actively adding AI features to their browsers, the Tor development team has chosen ...
Redazione RHC - 29/10/2025 - 21:19

Nvidia launches NVQLink for quantum computing

Nvidia hasn't developed its own quantum computer, but CEO Jensen Huang is betting the company will play a key role in the technology's future. In his ...
Redazione RHC - 29/10/2025 - 16:27

Tasting the Exploit: HackerHood tests Microsoft WSUS CVE-2025-59287 Exploit

The cybersecurity landscape was recently rocked by the discovery of a critical Remote Code Execution (RCE) vulnerability in Microsoft’s Windows Server...
Manuel Roccon - 29/10/2025 - 15:46
1 44 45 46 47 48 255

Cyber Incident Management in the NIS2 Era

- October 30th, 2025

The NIS 2 Decree (Legislative Decree 138/2024), effective October 16, 2024, implements the principles of the European NIS2 Directive, laying the foundation for a more complex operational model of collaboration...

Facebook Linkedin X

US builds largest AI supercomputer in history

- October 30th, 2025

The U.S. Department of Energy (DOE) has entered into a strategic collaboration with Nvidia and Oracle to build seven next-generation AI-powered supercomputers , set to revolutionize scientific research and the...

Facebook Linkedin X

Microsoft 365 goes down: DNS anomaly paralyzes services worldwide

- October 29th, 2025

A DNS service outage was detected by Microsoft on October 29, 2025, impacting access to critical services such as Microsoft Azure and Microsoft 365. An anomaly was detected at 21:37...

Facebook Linkedin X

Tor Browser Says No to Artificial Intelligence! Security Comes First

- October 29th, 2025

Interestingly, while major companies like Microsoft and Google are actively adding AI features to their browsers, the Tor development team has chosen to remove them. @henry, a Tor project contributor,...

Facebook Linkedin X

Nvidia launches NVQLink for quantum computing

- October 29th, 2025

Nvidia hasn't developed its own quantum computer, but CEO Jensen Huang is betting the company will play a key role in the technology's future. In his keynote address at Nvidia's...

Facebook Linkedin X

Tasting the Exploit: HackerHood tests Microsoft WSUS CVE-2025-59287 Exploit

- October 29th, 2025

The cybersecurity landscape was recently rocked by the discovery of a critical Remote Code Execution (RCE) vulnerability in Microsoft’s Windows Server Update Services (WSUS) . Identified as CVE-2025-59287 and with...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE