Red Hot Cyber. The Cybersecurity Blog
Nvidia loses 95% of the Chinese AI market! Export restrictions cause its share to plummet
Jen-Hsun Huang, founder and CEO of Nvidia, revealed that recent export restrictions have drastically reduced the presence of the company’s AI chips in China , from 95% to virtually nothing. “Four year...
Cyberdrones, radar evasion, and autonomous swarms: Rome, the invisible challenge of Jubilee 2025
Jubilee 2025 in Rome presents a challenge not only for managing millions of pilgrims and tourists, but also for protecting urban airspace. Drones, increasingly widespread and accessible, bring with th...
Bus becomes travelling museum of retro computers in UK
In the UK, father and son Jason and Luke Stoner have transformed an old school bus into a traveling museum dedicated to retro computers and game consoles. The inspiration came when Luke visited the fa...
100 years of Italian Intelligence! Mattarella celebrates the SIM’s centenary at the Quirinale Palace
October 15, 2025 marks an anniversary of exceptional importance in the history of Italian national security: one hundred years since the birth of the Military Information Service (SIM) , the country&#...
But what kind of Sovereign AI is running on the servers and algorithms of a US company!
This year, OpenAI announced a series of projects with foreign governments to create “sovereign AI” systems. According to the company, some of these agreements are currently being negotiate...
Flirt, eroticism, and the end of censorship! OpenAI will change the rules of ChatGPT.
OpenAI is preparing a major change to ChatGPT’s rules: starting in December, age-verified users will be able to interact with adult content, including erotica. The company’s CEO, Sam Altma...
“Double Bind” Leads to GPT-5 Jailbreak: The AI That Was Convinced It Was Schizophrenic
A new and unusual jailbreaking method, the art of circumventing the limitations imposed on artificial intelligence, has reached our editorial office. It was developed by computer security researcher A...
AI Alignment: Where Does AI Learn Right and Wrong?
The other day on LinkedIn, I found myself having a conversation with someone who was seriously interested in the topic of artificial intelligence applied to law. It wasn’t one of those barroom c...
Microsoft Patch Tuesday: 175 vulnerabilities fixed and two zero-days exploited
In its latest update, the tech giant fixed 175 vulnerabilities affecting its core products and underlying systems, including two actively exploited zero-day vulnerabilities , the company said in its l...
12 security bugs discovered in Ivanti Endpoint Manager (EPM). Update now!
Ivanti has published 13 vulnerabilities in its Endpoint Manager (EPM) software , including two high-severity flaws that could allow remote code execution and privilege escalation . Despite the lack of...
Featured Articles

Jen-Hsun Huang, founder and CEO of Nvidia, revealed that recent export restrictions have drastically reduced the presence of the company’s AI chips in China , from 95% to virtually nothing. “Four ...

Jubilee 2025 in Rome presents a challenge not only for managing millions of pilgrims and tourists, but also for protecting urban airspace. Drones, increasingly widespread and accessible, bring with th...

In the UK, father and son Jason and Luke Stoner have transformed an old school bus into a traveling museum dedicated to retro computers and game consoles. The inspiration came when Luke visited the fa...

October 15, 2025 marks an anniversary of exceptional importance in the history of Italian national security: one hundred years since the birth of the Military Information Service (SIM) , the country&#...

This year, OpenAI announced a series of projects with foreign governments to create “sovereign AI” systems. According to the company, some of these agreements are currently being negotiate...
IntelBroker Strikes Again: Unauthorized Access to Two Major American Companies Up for Sale
Exposed the Data of 3,379 Spanish Doctors! When Fraud Becomes “On-Target”
The other side of cybersecurity: stress and burnout are “by design” in domain experts
Musk’s Supercomputer in Memphis is ready! 100,000 liquid-cooled Nvidia H1s.
Microsoft releases USB tool to fix CrowdStrike BSOD problem on Windows 10 and 11
PoC Released for SQL Injection Without Authentication on WordPress WZone Plugin

IntelBroker Strikes Again: Unauthorized Access to Two Major American Companies Up for Sale
Raffaela Crisci - July 24th, 2024
IntelBroker strikes again, announcing the sale of unauthorized access to two major American companies, each with revenues reaching hundreds of billions. This announcement was made public through a post on...

Exposed the Data of 3,379 Spanish Doctors! When Fraud Becomes “On-Target”
Redazione RHC - July 24th, 2024
Recently, a threat actor in an underground forum called Breach Forums published an alleged data breach. The post claims to have exposed the names, departments, and emails of 3,379 Spanish...

The other side of cybersecurity: stress and burnout are “by design” in domain experts
Redazione RHC - July 23rd, 2024
We often talk about cyber security and the importance of a complete cyber program today. Today, however, we will focus on analyzing another important point in the profession of the...

Musk’s Supercomputer in Memphis is ready! 100,000 liquid-cooled Nvidia H1s.
Redazione RHC - July 23rd, 2024
Elon Musk, who simultaneously heads six innovative companies-Tesla, SpaceX, Starlink, X (formerly known as Twitter), Neuralink, and xAI-is not stopping there. He recently announced that xAI has begun training its...

Microsoft releases USB tool to fix CrowdStrike BSOD problem on Windows 10 and 11
Redazione RHC - July 23rd, 2024
Microsoft has released a tool for system administrators to simplify the process of fixing the blue screen of death (BSOD) on Windows 10 and 11 computers. The solution involves the...

PoC Released for SQL Injection Without Authentication on WordPress WZone Plugin
Pietro Melillo - July 19th, 2024
A proof of concept (PoC) for a critical vulnerability identified as CVE-2024-33544 has recently been released. This vulnerability involves an unauthenticated SQL injection, which poses a serious threat to the...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE