Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
TM RedHotCyber 320x100 042514
2nd Edition GlitchZone RHC 970x120 2

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Apple in the crosshairs? Alleged 9GB data breach claim on Darkforums

Author : Inva Malaj and Raffaela Crisci 04/10/2025 – Darkforums.st: “303” Claims 9GB Data Breach on Apple.com In the early...
Inva Malaj - 5 October 2025

When AI writes poetry: is the future of human creativity over?

In 1950, Alan Turing, considered the father of artificial intelligence, was still wondering "Can machines think?" Today, more than seventy...
Redazione RHC - 5 October 2025

The AI we love! From years to just months to discover a molecule for Crohn’s disease

Antibiotics for inflammatory bowel disease can be a double-edged sword. While they suppress inflammation, they also kill beneficial bacteria, not...
Redazione RHC - 4 October 2025

Discord Confirms Hack Attack: Sensitive Information at Risk

A third-party customer service provider was compromised by hackers, who gained access to partial payment information and personally identifiable information...
Redazione RHC - 4 October 2025

SoopSocks: The PyPI Package That Looked Like a Proxy But Was a Backdoor to Windows

The story of SoopSocks is one we, unfortunately, know well: a PyPI package that promises utility — a SOCKS5 proxy...
Antonio Piazzolla - 4 October 2025

US raises alarm over core chip manufacturing: Too dependent on China by 2030

On October 2, the Financial Times published an analysis by Mike Kuiken, a senior national security adviser and fellow at...
Redazione RHC - 4 October 2025

US embeds location tracking devices in AI chips to prevent hijackings to China

According to media reports, US authorities are secretly embedding tracking devices in chip shipments that could be illegally diverted to China. The trackers could be used in shipments of equipment...
Share on Facebook Share on LinkedIn Share on X

Full-on spying! The Skydweller solar drone flies for nearly three days non-stop.

The American startup Skydweller Aero has announced the successful testing of its solar drone, which spent nearly three days in flight without refueling. The device, with a wingspan larger than...
Share on Facebook Share on LinkedIn Share on X

Linux 6.17 Without BCachefs Due to Community Controversy

The first version of the Linux kernel, 6.17, has been released, with no changes to the bcachefs file system. And the reason isn't due to any technical issues. On August...
Share on Facebook Share on LinkedIn Share on X

Man Dies After Fake Encounter with Meta Chatbot

A 76-year-old New Jersey man died after a Meta chatbot convinced him to attend a meeting in New York. Thongbu Wongbandu, known to friends as Boo, suffered from cognitive decline...
Share on Facebook Share on LinkedIn Share on X

Google Chrome goes privacy-first! A new script blocker for incognito mode

Google is testing a new feature to improve privacy in Chrome's incognito mode on Windows: incognito script blocking (PrivacySandboxFingerprintingProtectionEnabled). This feature will block third-party scripts that use fingerprinting techniques to...
Share on Facebook Share on LinkedIn Share on X

Musk reveals he may lose control of Tesla

Musk recently stated publicly that his control over the company is precarious and that he "could be ousted." The controversy arose from Musk's publicly expressed concerns about his stake. Musk...
Share on Facebook Share on LinkedIn Share on X

After 18 years of silence, Anne begins to speak again. The new BCI technology from the University of Berkeley

Eighteen years after a brainstem stroke left Anne Johnson almost completely paralyzed, she's now using a brain-computer interface (BCI) that converts speech directly from brain signals. In 2005, at age...
Share on Facebook Share on LinkedIn Share on X

Will drones on missions be able to autonomously decide which men to kill?

It appears that the United States has already seriously considered the concept of autonomous warfare. DARPA's autonomous fighter jet, capable of unmanned combat, is no longer considered a breakthrough: the...
Share on Facebook Share on LinkedIn Share on X

After the laundry, Figure 02 now folds the laundry. But for now, you’ll have to continue doing it yourself.

Just two weeks ago, the humanoid robot produced by Figure amazed us when it deftly removed clothes from a laundry basket and placed them in a washing machine. This was...
Share on Facebook Share on LinkedIn Share on X

Did you respond to IT support on Teams? Congratulations! The Trojan is on your PC with rights that exceed yours.

The research team at Trustwave SpiderLabs has identified a new wave of EncryptHub attacks that combine human error and the exploitation of a vulnerability in the Microsoft Management Console. Operators...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sito
RansomHouse Ransomware Upgraded: Enhanced Encryption Threat
Redazione RHC - 22/12/2025

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…

Immagine del sito
Cyber Attacks on the Rise: Wiper Malware and Data Destruction in 2025
Redazione RHC - 22/12/2025

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers use wipers, destructive tools that…

Immagine del sito
MS13-089 Ransomware: Double Extortion Without Encryption
Inva Malaj - 22/12/2025

MS13-089 opens a leak site on the dark web, exposes the first data and adopts a double extortion strategy without encryption. A brand built on an old Microsoft ID For years, “MS13-089” identified a 2013…

Immagine del sito
Microsoft Shifts Activation Process: What It Means for Air-Gapped Systems
Redazione RHC - 22/12/2025

In the past, many users and system administrators have relied on Microsoft’s telephone activation service to manage installations in specific contexts. During the Windows 8 era, MAK ( Multiple Activation Key) licenses were widely available.…

Immagine del sito
DIG AI: The Dark Web’s New AI Tool for Cybercrime
Redazione RHC - 21/12/2025

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…