Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
TM RedHotCyber 320x100 042514
Enterprise BusinessLog 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
WhatsApp Blocked in Russia: Messaging App Faces Crackdown
Di Redazione RHC - 28/11/2025

The Russian Federation’s Roskomnadzor has announced that it continues to impose systematic restrictions on the messaging app WhatsApp due to violations of Russian law. According to the agency, the s...

Immagine del sito
Shai-Hulud Worm Spreads Beyond npm, Attacks Maven
Di Redazione RHC - 28/11/2025

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Immagine del sito
11.7% of jobs could be replaced by artificial intelligence
Di Redazione RHC - 28/11/2025

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Magnus Carlsen beats ChatGPT at chess without losing a piece!

Magnus Carlsen beat ChatGPT at chess without losing a single piece, while his virtual opponent lost all his pawns. The Norwegian grandmaster posted sc...
Redazione RHC - 18/07/2025 - 16:50

Putin imposes restrictions on foreign software that has “strangled” Russia

The Kremlin press office reported that Russian President Vladimir Putin has instructed the government to develop additional restrictions on software (...
Redazione RHC - 18/07/2025 - 11:01

How an LLM Really Works: Costs, Infrastructure, and the Technical Choices Behind Big Language Models

In recent years, large language models (LLM, Large Language Models) such as GPT, Claude, or LLaMA have demonstrated extraordinary capabilities in unde...
Redazione RHC - 18/07/2025 - 08:21

Sophos fixes vulnerabilities in Intercept X for Windows

Sophos announced that it has resolved three separate security vulnerabilities in Sophos Intercept X for Windows and its installer. These vulnerabiliti...
Redazione RHC - 18/07/2025 - 07:41

Three score 10 bugs have been detected in Cisco ISE and ISE-PIC: urgent updates required.

Several vulnerabilities have been identified in the Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) products t...
Redazione RHC - 18/07/2025 - 07:41

OMGCable: The Thin Red Line Between Penetration Testing and Covert Surveillance

In 2021, during one of my explorations into the increasingly blurred boundary between hardware and cybersecurity, I wrote an article with a title that...
Redazione RHC - 17/07/2025 - 16:12

Magnus Carlsen beats ChatGPT at chess without losing a piece!

- July 17th, 2025

Magnus Carlsen beat ChatGPT at chess without losing a single piece, while his virtual opponent lost all his pawns. The Norwegian grandmaster posted screenshots of the game on the social...

Facebook Linkedin X

Putin imposes restrictions on foreign software that has “strangled” Russia

- July 17th, 2025

The Kremlin press office reported that Russian President Vladimir Putin has instructed the government to develop additional restrictions on software (including "communications services")produced in hostile countries by September 1, 2025....

Facebook Linkedin X

How an LLM Really Works: Costs, Infrastructure, and the Technical Choices Behind Big Language Models

- July 17th, 2025

In recent years, large language models (LLM, Large Language Models) such as GPT, Claude, or LLaMA have demonstrated extraordinary capabilities in understanding and generating natural language. However, behind the scenes,...

Facebook Linkedin X

Sophos fixes vulnerabilities in Intercept X for Windows

- July 17th, 2025

Sophos announced that it has resolved three separate security vulnerabilities in Sophos Intercept X for Windows and its installer. These vulnerabilities, designated CVE-2024-13972, CVE-2025-7433, and CVE-2025-7472, have been rated High...

Facebook Linkedin X

Three score 10 bugs have been detected in Cisco ISE and ISE-PIC: urgent updates required.

- July 17th, 2025

Several vulnerabilities have been identified in the Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) products that could allow a remote attacker to execute arbitrary commands...

Facebook Linkedin X

OMGCable: The Thin Red Line Between Penetration Testing and Covert Surveillance

- July 16th, 2025

In 2021, during one of my explorations into the increasingly blurred boundary between hardware and cybersecurity, I wrote an article with a title that today sounds almost prophetic: “Even a...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE