Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Mobile V1
Fortinet 970x120px

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Artificial General Intelligence (AGI): the first global standard for measuring it has been defined
Di Redazione RHC - 23/10/2025

On October 21, 2025, an international team of researchers from 29 leading institutions—including Stanford University, MIT, and the University of California, Berkeley —completed a study that marks ...

Immagine del sito
ChatGPT buys me bread! Atlas, the smart browser for macOS, is here.
Di Redazione RHC - 22/10/2025

OpenAI has released the ChatGPT Atlas browser for macOS. It integrates artificial intelligence directly into the interface and can perform tasks on web pages without having to switch between tabs. Atl...

Immagine del sito
F5 BIG-IP Vulnerability: 266,000 Devices at Risk Worldwide! 2,500 in Italy
Di Redazione RHC - 20/10/2025

The Cybersecurity and Infrastructure Security Agency (CISA) and the Multi-State Information Sharing & Analysis Center (MS-ISAC) are issuing this Joint Cybersecurity Advisory (CSA) in response to t...

Immagine del sito
The Intel 386 processor turns 40: the 32-bit era began
Di Redazione RHC - 20/10/2025

October 20, 2025, marks a significant anniversary in the history of computing: the Intel 80386 processor, also known as the i386 , celebrates its 40th birthday . And it’s a big birthday! Launche...

Immagine del sito
Intel releases urgent patches for new Spectre variant
Di Redazione RHC - 19/10/2025

VUSec researchers have presented a paper titled “Training Solo,” which challenges the fundamental principles of protection against Spectre-v2 attacks. Previously , the domain isolation mec...

DAS: The world’s ear hidden in submarine cables

Over 1.2 million kilometers of fiber optic cables lie on the ocean floor, long considered solely part of a global telecommunications network. However,...
Redazione RHC - 13/10/2025 - 07:12

Hacker culture pioneer Peter Samson plays “Boards of Canada” on PDP-1

In a world where music has long since migrated to streaming and digital platforms, one enthusiast decided to go back six decades, to a time when melod...
Redazione RHC - 12/10/2025 - 21:17

Crimson Collective claims alleged Nintendo hack: bluff or real breach?

This time, hackers are targeting Nintendo , the historic Japanese video game company that has been tooth and nail for decades defending its intellectu...
Luca Galuppi - 12/10/2025 - 18:34

Critical vulnerabilities in Microsoft Defender for Endpoint: security risks

Security flaws have been discovered in network communication between Microsoft Defender for Endpoint (DFE) cloud services , allowing attackers, follow...
Redazione RHC - 12/10/2025 - 17:49

Between AI and fear, Skynet teaches: “We’ll build bunkers before launching AGI.”

The quote, “We’ll definitely build a bunker before we launch AGI,” that inspired the article, was attributed to a Silicon Valley leader, though it’s u...
Redazione RHC - 12/10/2025 - 09:06

GitHub is migrating to Azure! And goodbye to new development for a year.

When Microsoft acquired GitHub in 2018, the company tried to stay away. The platform developed relatively independently until things began to change i...
Redazione RHC - 12/10/2025 - 08:24
1 17 18 19 20 21 202

DAS: The world’s ear hidden in submarine cables

- October 13th, 2025

Over 1.2 million kilometers of fiber optic cables lie on the ocean floor, long considered solely part of a global telecommunications network. However, distributed acoustic sensing (DAS) technology , rapidly...

Facebook Linkedin X

Hacker culture pioneer Peter Samson plays “Boards of Canada” on PDP-1

- October 12th, 2025

In a world where music has long since migrated to streaming and digital platforms, one enthusiast decided to go back six decades, to a time when melodies could still come...

Facebook Linkedin X

Crimson Collective claims alleged Nintendo hack: bluff or real breach?

- October 12th, 2025

This time, hackers are targeting Nintendo , the historic Japanese video game company that has been tooth and nail for decades defending its intellectual property and the industrial secrets that...

Facebook Linkedin X

Critical vulnerabilities in Microsoft Defender for Endpoint: security risks

- October 12th, 2025

Security flaws have been discovered in network communication between Microsoft Defender for Endpoint (DFE) cloud services , allowing attackers, following a breach, to bypass authentication, manipulate data, release sensitive information,...

Facebook Linkedin X

Between AI and fear, Skynet teaches: “We’ll build bunkers before launching AGI.”

- October 12th, 2025

The quote, “We’ll definitely build a bunker before we launch AGI,” that inspired the article, was attributed to a Silicon Valley leader, though it’s unclear who exactly he meant by...

Facebook Linkedin X

GitHub is migrating to Azure! And goodbye to new development for a year.

- October 12th, 2025

When Microsoft acquired GitHub in 2018, the company tried to stay away. The platform developed relatively independently until things began to change in recent months. The departure of GitHub CEO...

Facebook Linkedin X
Most Read Articles of the Month Most Read Articles of the Week
  1. The Truth About Windows XP License Key: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8
  2. Google launches Gemini 3.0 Pro: new multimodal language model
  3. Computer science graduates with no future! Thousands of resumes ignored, and goodbye to six-figure salaries.
  4. Google Announces Gemini 3.0: Artificial Intelligence Evolves Toward AGI
  5. With 50 dollars and physical access to the server, the Cloud goes to hell
  1. Google launches Gemini 3.0 Pro: new multimodal language model
  2. Google Announces Gemini 3.0: Artificial Intelligence Evolves Toward AGI
  3. Critical vulnerability in Windows SMB client: CISA raises alarm
  4. NIS2 and new ACN guidelines: what changes for companies and how to prepare
  5. ChatGPT writes the perfect scam… but the scammer leaves the AI instructions inside.

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE