Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Enterprise BusinessLog 320x200 1
970x20 Itcentric

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
ChatGPT Atlas: Researchers Discover How a Link Can Lead to Jailbreak
Di Redazione RHC - 29/10/2025

NeuralTrust researchers have discovered a vulnerability in OpenAI’s ChatGPT Atlas browser. This time, the attack vector is linked to the omnibox, the bar where users enter URLs or search queries...

Immagine del sito
Malware alert: Critical WordPress plugin vulnerabilities actively exploited
Di Redazione RHC - 29/10/2025

Wordfence is raising the alarm about a large-scale malware campaign in which attackers are exploiting critical vulnerabilities in the popular WordPress plugins GutenKit and Hunk Companion . The compan...

Immagine del sito
Gemini 3.0 Pro: What people who are trying it say
Di Redazione RHC - 28/10/2025

In recent days, a select few users have reported having access to the new Gemini 3.0 Pro model. Initial impressions suggest a significant improvement over the previous generation, so much so that many...

Immagine del sito
China promotes global AI governance under the United Nations
Di Redazione RHC - 27/10/2025

On October 27, the Blue Hall Forum on the theme of “Improving Global Governance and Building a Community with a Shared Future for Humanity” was held at the Ministry of Foreign Affairs in B...

Immagine del sito
Criminal Hackers Breach US Nuclear Weapons Production Facilities
Di Redazione RHC - 27/10/2025

Government hackers breached a nuclear weapons component manufacturing facility in the United States by exploiting vulnerabilities in Microsoft SharePoint. The incident affected the Kansas City Nationa...

Ada Lovelace and Charles Babbage, pioneers of programmable computing

Author: Antonio Piovesan Pubblication date: 28/09/2021 Introduction - Age of machines Great Britain, middle decades of the 19th century, times of unpr...
Antonio Piovesan - 04/10/2021 - 11:40

Dharma/Crysis: Overview and adversary tracking

Author: Emanuele De Lucia Pubblication date: 17/09/2021 This report presents an overview about Dharma/Crysis ransomware. This piece of malware is o...
Emanuele De Lucia - 17/09/2021 - 19:08

Avoiding the fis-hack-erman’s hook (aka Detecting a Phishing email)

Author: Antonio PiovesanPubblication Date: 09/08/2021 With the increase of ransomware infections - often instigated through phishing emails, it's v...
Antonio Piovesan - 22/08/2021 - 17:17
1 208 209 210

Ada Lovelace and Charles Babbage, pioneers of programmable computing

- October 4th, 2021

Author: Antonio Piovesan Pubblication date: 28/09/2021 Introduction - Age of machines Great Britain, middle decades of the 19th century, times of unprecedented engineering ambitions. Engineering, transportation, communications, architecture, science and...

Facebook Linkedin X

Dharma/Crysis: Overview and adversary tracking

- September 17th, 2021

Author: Emanuele De Lucia Pubblication date: 17/09/2021 This report presents an overview about Dharma/Crysis ransomware. This piece of malware is often observed as late-stage payload in attacks against internet-facing systems,...

Facebook Linkedin X

Avoiding the fis-hack-erman’s hook (aka Detecting a Phishing email)

- August 22nd, 2021

Author: Antonio PiovesanPubblication Date: 09/08/2021 With the increase of ransomware infections - often instigated through phishing emails, it's very important/crucial to take proactive measures to help protect yourself and your...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE