Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Crowdstrike 320×100
Banner Desktop

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

The Story of Microsoft Solitaire: From Launch with Windows 3.0 to Enduring Success Cybercrime

The Story of Microsoft Solitaire: From Launch with Windows 3.0 to Enduring Success

Microsoft first released Solitaire in 1990 with Windows 3.0, as a tool to familiarize users with the graphical interface and...
Redazione RHC - 21 September 2025
Removing private data from AI models? Now you can without accessing the original datasets. Cybercrime

Removing private data from AI models? Now you can without accessing the original datasets.

A team from the University of California, Riverside, has demonstrated a new way to remove private and copyrighted data from...
Redazione RHC - 21 September 2025
Edge vs. Chrome: Microsoft promotes its browser with aggressive ads on Bing Cybercrime

Edge vs. Chrome: Microsoft promotes its browser with aggressive ads on Bing

Microsoft has once again launched an aggressive campaign for its proprietary Edge browser. This time, the software giant is displaying...
Redazione RHC - 21 September 2025
Will Nvidia’s robotic brain revolutionize artificial intelligence and robotics? Cybercrime

Will Nvidia’s robotic brain revolutionize artificial intelligence and robotics?

On August 24, the official Nvidia Robotics account shared an image on social media of a black gift box accompanied...
Redazione RHC - 21 September 2025
Qilin leads ransomware attacks as new groups emerge underground Cybercrime

Qilin leads ransomware attacks as new groups emerge underground

Qilin continues to lead the way among all active crypto attack groups, significantly lagging behind its competitors in the number...
Redazione RHC - 21 September 2025
RevengeHotels Improves VenomRAT with Artificial Intelligence Cybercrime

RevengeHotels Improves VenomRAT with Artificial Intelligence

Kaspersky Lab experts have detected a new wave of attacks by the RevengeHotels group. A distinctive feature of this campaign...
Redazione RHC - 21 September 2025

Disloyal employees. Let’s find out who they are and how to protect ourselves from this growing threat.

In the digital age, cybersecurity is a critical issue for any company handling sensitive data. However, not all risks are external. In fact, employees themselves often pose a threat to...
Share on Facebook Share on LinkedIn Share on X

Bullying and cyberbullying: what it is and how to protect yourself.

News reports are highlighting an ever-increasing number of cases of cyberbullying, some with dramatic outcomes (see incitement to suicide). Cyberbullying is a new form of psychological violence, an invasion and...
Share on Facebook Share on LinkedIn Share on X

What is Electronic Warfare (EW). Superiority in the Electromagnetic Spectrum

Electronic Warfare (EW) is one of the most sophisticated and strategically relevant disciplines in modern security. In an age dominated by technology, where information superiority can decide the outcome of...
Share on Facebook Share on LinkedIn Share on X

What is SIM Swapping? Here’s how it works.

These days, smartphones are in practically everyone's pockets. We use them for entertainment, sending messages, storing notes, taking photos, transferring money, and even "making phone calls," which is what they...
Share on Facebook Share on LinkedIn Share on X

What are zero-day brokers? Discovering the underground market of security vulnerabilities

Zeroday brokers are intermediaries who buy and sell software vulnerabilities that are unknown to the manufacturers and organizations that use them. These vulnerabilities, known as "zerodays," are exploited by cybercriminals...
Share on Facebook Share on LinkedIn Share on X

Apache Tomcat DoS Vulnerability: CVE-2025-53506 Under Analysis

The Apache team recently fixed a denial-of-service (DoS) vulnerability classified as high severity. There's a new inconvenient guest in data centers around the world. It's called CVE-2025-53506 and it doesn't...
Share on Facebook Share on LinkedIn Share on X

Magnus Carlsen beats ChatGPT at chess without losing a piece!

Magnus Carlsen beat ChatGPT at chess without losing a single piece, while his virtual opponent lost all his pawns. The Norwegian grandmaster posted screenshots of the game on the social...
Share on Facebook Share on LinkedIn Share on X

Magnus Carlsen beats ChatGPT at chess without losing a piece!

Magnus Carlsen beat ChatGPT at chess without losing a single piece, while his virtual opponent lost all his pawns. The Norwegian grandmaster posted screenshots of the game on the social...
Share on Facebook Share on LinkedIn Share on X

Putin imposes restrictions on foreign software that has “strangled” Russia

The Kremlin press office reported that Russian President Vladimir Putin has instructed the government to develop additional restrictions on software (including "communications services")produced in hostile countries by September 1, 2025....
Share on Facebook Share on LinkedIn Share on X

How an LLM Really Works: Costs, Infrastructure, and the Technical Choices Behind Big Language Models

In recent years, large language models (LLM, Large Language Models) such as GPT, Claude, or LLaMA have demonstrated extraordinary capabilities in understanding and generating natural language. However, behind the scenes,...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Webrat Malware Targets Security Researchers with GitHub Exploit Traps
Redazione RHC - 24/12/2025

There’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…

Immagine del sitoCybercrime
A backdoor in NVIDIA code. Three 9.8 bugs plague AI and robotics development systems
Redazione RHC - 24/12/2025

When it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…

Immagine del sitoCybercrime
La Poste Hit by Pro-Russian DDoS Attack During Peak Holiday Season
Redazione RHC - 23/12/2025

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…

Immagine del sitoVulnerability
CVE-2025-47761: FortiClient VPN Zero-Day Exploit Lets Privilege Escalation
Manuel Roccon - 23/12/2025

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…

Immagine del sitoCybercrime
Critical MongoDB Vulnerability Exposed: CVE-2025-14847
Redazione RHC - 23/12/2025

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…