Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

- June 27th, 2025 - (Posted in Cybercrime and Darknet)
An unusual example of malicious code has been discovered in a real computing environment, which for the first time recorded an attempt to attack not classical defense mechanisms, but directly artificial intelligence systems. We are talking about the prompt injection technique, i.e. the introduction of hidden instructions capable of compromising...
Cybercrime and Darknet

Skynet is coming: the malware that attacks Artificial Intelligence!

An unusual example of malicious code has been discovered in a real computing environment, which for the first time recorded an attempt to attack not classical defense mechanisms, but directly artificial intelligence systems. We are talking about the prompt injection

Apple and Google under pressure: German regulator wants to remove DeepSeek

- June 28th, 2025

Following the Italian data protection regulator, Germany's data protection watchdog has now asked Apple and Alphabet subsidiary Google to remove the Chinese artificial intelligence (AI) startup's DeepSeek app from their...

  

A former Australian university student has been accused of hacking Western Sydney University

- June 28th, 2025

New South Wales police have arrested a 27-year-old former Western Sydney University student who had repeatedly hacked into the university's systems, including to obtain cheaper parking. Western Sydney University is...

  

Cyber War: The Invisible War in Cyberspace That Decides the Conflicts of the Present

- June 27th, 2025

In the heart of contemporary conflicts, alongside tanks, drones and troops, an invisible, silent and often underestimated war is being fought: cyber war. It is not just a futuristic scenario...

  

Skynet is coming: the malware that attacks Artificial Intelligence!

- June 27th, 2025

An unusual example of malicious code has been discovered in a real computing environment, which for the first time recorded an attempt to attack not classical defense mechanisms, but directly...

  

Sign up for the newsletter