Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
TM RedHotCyber 320x100 042514
Redhotcyber Banner Sito 970x120px Uscita 101125

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

China surpasses US in open-source AI models Cybercrime

China surpasses US in open-source AI models

China surpasses the United States in the global market for open-source artificial intelligence (AI) models. According to a November 26...
Redazione RHC - 28 November 2025
ENISA takes on the role of Root in the European Cybersecurity Initiative (CVE). Cybercrime

ENISA takes on the role of Root in the European Cybersecurity Initiative (CVE).

The European Union Agency for Cybersecurity (ENISA) has taken on the role of Root within the Common Vulnerabilities and Exposures...
Redazione RHC - 27 November 2025
Supply Chain Attack on OpenAI: Analytics Provider Mixpanel Compromised Cybercrime

Supply Chain Attack on OpenAI: Analytics Provider Mixpanel Compromised

OpenAI has confirmed a security incident at Mixpanel, a third-party analytics provider used for its APIs. According to the investigation,...
Redazione RHC - 27 November 2025
Be careful when using SSDs! Without power, you risk data loss Cybercrime

Be careful when using SSDs! Without power, you risk data loss

XDA Developers reminds us that using solid-state drives for long-term storage is risky. If SSDs are left without power for...
Redazione RHC - 27 November 2025
Quantum Computing vs. Artificial Intelligence: Which Will Really Change the Future? Cybercrime

Quantum Computing vs. Artificial Intelligence: Which Will Really Change the Future?

Quantum mechanics remains a complex and mysterious field, both difficult to explain and difficult to understand. This branch of physics...
Redazione RHC - 27 November 2025
ToddyCat APT Group Targets Microsoft 365 Email Security Cybercrime

ToddyCat APT Group Targets Microsoft 365 Email Security

Email security continues to be one of the most critical points in modern cyber attacks. While compromising a Windows domain...
Redazione RHC - 27 November 2025

Google Gemini 3.0: New features and updates for the year’s most anticipated AI assistant

Over the past week, Google announced that the Gemini Assistant can now natively integrate YouTube and Google Maps services without the need to use specific commands like "@YouTube" or "@Google...
Share on Facebook Share on LinkedIn Share on X

Domestic robots and privacy: the hidden price of the automated future

The home of the future is full of robots. Automated laundries, personal assistants, and small electronic housekeepers are all devices designed to free up precious time and make domestic life...
Share on Facebook Share on LinkedIn Share on X

The tale of the Mayor who thought of banning axes… but then came the Saws

Once upon a time, there was a town that had a Magical Forest. It was happy to have it, even a little proud. Which is why all the citizens willingly...
Share on Facebook Share on LinkedIn Share on X

WhatsApp used to spread LANDFALL, the new spyware for Android Samsung

Researchers at Palo Alto Networks Unit 42 have discovered a new, previously unknown family of Android spyware called LANDFALL . To spread it, malicious actors exploited a zero-day vulnerability (CVE-2025-21042)...
Share on Facebook Share on LinkedIn Share on X

Trump and Kim Jong Un summit? There seems to be a high probability of a meeting.

South Korean intelligence agencies , including the National Intelligence Service, reportedly believe there is a high probability that US President Donald Trump will hold a summit with North Korean Workers'...
Share on Facebook Share on LinkedIn Share on X

New York sues Facebook, Instagram, TikTok, and YouTube over youth mental health crises

The City of New York filed a lawsuit on Wednesday against a group of prominent social media platforms, including TikTok, YouTube, Instagram, and Facebook, accusing them of contributing to a...
Share on Facebook Share on LinkedIn Share on X

Sam Altman: “I hope that bad things don’t happen because of technology.”

The latest statements by Sam Altman, CEO of OpenAI, regarding the progress of artificial intelligence (AI) are not very encouraging, as he recently stated that he is concerned about "the...
Share on Facebook Share on LinkedIn Share on X

Microsoft’s new goal for artificial intelligence? Medicine!

The tech giant has announced the creation of a new development team for a "superhuman" artificial intelligence that will outperform human experts in medical diagnoses. The team will be led...
Share on Facebook Share on LinkedIn Share on X

Artificial intelligence and security? What a tragedy!

A simple idea to simplify home network management and improve security unexpectedly turned into a series of near-catastrophic errors, all due to the advice of popular artificial intelligence assistants. Instead...
Share on Facebook Share on LinkedIn Share on X

Rust 1.91: Full Windows support on ARM is here!

Rust has received a major update : version 1.91 officially brings Windows support on 64-bit ARM systems to the same level as Linux and macOS. Builds for the aarch64-pc-windows-msvc architecture...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Veeam Backup Vulnerability: Critical RCE Flaw Discovered – Update Now
Redazione RHC - 08/01/2026

Backups are generally considered the last line of defense, but this week Veeam reminded us that backup systems themselves can become entry points for attacks. The company released security updates for Backup & Replication ,…

Immagine del sitoCybercrime
When Attack Discovery Becomes Automated, Detection Stops Scaling
Alexander Rogan - 08/01/2026

For much of the past two decades, cybersecurity has been built on a simple assumption: malicious activity can be detected, analysed, and responded to before meaningful damage occurs. This assumption shaped everything from SOC design…

Immagine del sitoCybercrime
CVE-2026-21858: n8n Vulnerability Exposes Thousands of Servers to RCE
Redazione RHC - 08/01/2026

The vulnerability, identified as CVE-2026-21858, which we recently reported on, affects approximately 100,000 servers worldwide, threatening to expose proprietary API keys, customer databases, and AI workflows. The vulnerability, with a CVSS score of 10, has…

Immagine del sitoCybercrime
Disable Windows 11 AI Features Easily with RemoveWindowsAI Tool
Redazione RHC - 07/01/2026

A new open-source script allows Windows 11 users to widely disable the operating system’s built-in artificial intelligence features . The project, developed by Zoicware , is called RemoveWindowsAI and aims to offer greater control over…

Immagine del sitoCybercrime
DevSecOps: Integrating Security into Your Development Process
Massimiliano Brolli - 07/01/2026

When it comes to application security, there’s rarely a single problem. It’s almost always a chain of small flaws, poor decisions, and missing controls that, when added together, pave the way for serious incidents. This…