Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
LECS 320x100 1
UtiliaCS 970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Artificial General Intelligence (AGI): the first global standard for measuring it has been defined
Di Redazione RHC - 23/10/2025

On October 21, 2025, an international team of researchers from 29 leading institutions—including Stanford University, MIT, and the University of California, Berkeley —completed a study that marks ...

Immagine del sito
ChatGPT buys me bread! Atlas, the smart browser for macOS, is here.
Di Redazione RHC - 22/10/2025

OpenAI has released the ChatGPT Atlas browser for macOS. It integrates artificial intelligence directly into the interface and can perform tasks on web pages without having to switch between tabs. Atl...

Immagine del sito
F5 BIG-IP Vulnerability: 266,000 Devices at Risk Worldwide! 2,500 in Italy
Di Redazione RHC - 20/10/2025

The Cybersecurity and Infrastructure Security Agency (CISA) and the Multi-State Information Sharing & Analysis Center (MS-ISAC) are issuing this Joint Cybersecurity Advisory (CSA) in response to t...

Immagine del sito
The Intel 386 processor turns 40: the 32-bit era began
Di Redazione RHC - 20/10/2025

October 20, 2025, marks a significant anniversary in the history of computing: the Intel 80386 processor, also known as the i386 , celebrates its 40th birthday . And it’s a big birthday! Launche...

Immagine del sito
Intel releases urgent patches for new Spectre variant
Di Redazione RHC - 19/10/2025

VUSec researchers have presented a paper titled “Training Solo,” which challenges the fundamental principles of protection against Spectre-v2 attacks. Previously , the domain isolation mec...

Poisoned AI! 250 Malicious Documents Are Enough to Compromise an LLM

Researchers at Anthropic, in collaboration with the UK government's AI Safety Institute, the Alan Turing Institute, and other academic institutions, r...
Redazione RHC - 13/10/2025 - 15:10

Spyware yes, spyware no: it’s just a prospect! NSO Group is now under US control.

Israeli company NSO Group, developer of the infamous Pegasus spyware , recently came under the control of American investors. A company spokesperson a...
Redazione RHC - 13/10/2025 - 14:28

Electricians and plumbers: They are the real winners of the AI boom

Jensen Huang, CEO of NVIDIA, has openly stated that the real winners in the AI boom, at least in the short to medium term, will be electricians, plumb...
Sandro Sana - 13/10/2025 - 11:03

Towards “legal technology”: legal education in the digital age must be technological.

As a criminal lawyer and professor of Criminal Computer Law, a student of the late Vittorio Frosini, a pioneer of legal informatics in Italy, I consta...
Paolo Galdieri - 13/10/2025 - 09:27

ProxyCommand: The Little String That Opens a Port for Exploits

Yesterday, a vulnerability in OpenSSH, CVE-2025-61984, was published that potentially allows command execution on the client when ProxyCommand is used...
Antonio Piazzolla - 13/10/2025 - 08:04

The AI bubble: fears of a new technological meltdown grow

At DevDay, OpenAI's annual conference this week, CEO Sam Altman took questions from reporters, an increasingly rare occurrence among tech leaders. Alt...
Redazione RHC - 13/10/2025 - 07:39
1 16 17 18 19 20 202

Poisoned AI! 250 Malicious Documents Are Enough to Compromise an LLM

- October 13th, 2025

Researchers at Anthropic, in collaboration with the UK government's AI Safety Institute, the Alan Turing Institute, and other academic institutions, reported that just 250 specially crafted malicious documents were enough...

Facebook Linkedin X

Spyware yes, spyware no: it’s just a prospect! NSO Group is now under US control.

- October 13th, 2025

Israeli company NSO Group, developer of the infamous Pegasus spyware , recently came under the control of American investors. A company spokesperson announced that the new funding amounts to tens...

Facebook Linkedin X

Electricians and plumbers: They are the real winners of the AI boom

- October 13th, 2025

Jensen Huang, CEO of NVIDIA, has openly stated that the real winners in the AI boom, at least in the short to medium term, will be electricians, plumbers, and skilled...

Facebook Linkedin X

Towards “legal technology”: legal education in the digital age must be technological.

- October 13th, 2025

As a criminal lawyer and professor of Criminal Computer Law, a student of the late Vittorio Frosini, a pioneer of legal informatics in Italy, I constantly reflect on the state...

Facebook Linkedin X

ProxyCommand: The Little String That Opens a Port for Exploits

- October 13th, 2025

Yesterday, a vulnerability in OpenSSH, CVE-2025-61984, was published that potentially allows command execution on the client when ProxyCommand is used with usernames containing control characters (e.g., newlines). Some OpenSSH input...

Facebook Linkedin X

The AI bubble: fears of a new technological meltdown grow

- October 13th, 2025

At DevDay, OpenAI's annual conference this week, CEO Sam Altman took questions from reporters, an increasingly rare occurrence among tech leaders. Altman acknowledged the uncertainty surrounding the AI industry today,...

Facebook Linkedin X
Most Read Articles of the Month Most Read Articles of the Week
  1. The Truth About Windows XP License Key: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8
  2. Google launches Gemini 3.0 Pro: new multimodal language model
  3. Computer science graduates with no future! Thousands of resumes ignored, and goodbye to six-figure salaries.
  4. Google Announces Gemini 3.0: Artificial Intelligence Evolves Toward AGI
  5. With 50 dollars and physical access to the server, the Cloud goes to hell
  1. Google launches Gemini 3.0 Pro: new multimodal language model
  2. Google Announces Gemini 3.0: Artificial Intelligence Evolves Toward AGI
  3. Critical vulnerability in Windows SMB client: CISA raises alarm
  4. NIS2 and new ACN guidelines: what changes for companies and how to prepare
  5. ChatGPT writes the perfect scam… but the scammer leaves the AI instructions inside.

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE