Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Ancharia Mobile 1
Banner Desktop

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Hanyuan-1: China’s room-temperature quantum computer challenges the US
Di Redazione RHC - 03/11/2025

China’s first atomic quantum computer has reached a major commercial milestone, recording its first sales to domestic and international customers, according to state media. The Hubei Daily, a st...

Immagine del sito
Inside NVIDIA: Jensen Huang leads 36 managers, 36,000 employees, and reads 20,000 emails a day
Di Redazione RHC - 03/11/2025

NVIDIA CEO Jen-Hsun Huang now directly oversees 36 employees across seven key areas: strategy, hardware, software, artificial intelligence, public relations, networking, and executive assistants. This...

Immagine del sito
Will Bug Hunters Be Out of Work? OpenAI Introduces Aardvark, Its New Bug Fixer
Di Redazione RHC - 03/11/2025

OpenAI has unveiled Aardvark, an autonomous assistant based on the GPT-5 model , designed to automatically find and fix vulnerabilities in software code. This AI tool, dubbed a “security researc...

Immagine del sito
The Louvre Theft: How Password Governance Can Undermine Security
Di Redazione RHC - 03/11/2025

“When the Key Is ‘Louvre’ – The Theft That Teaches How Password Governance Can Shake Even the Most Violable Fortresses” On October 19, 2025, the Louvre Museum was the sce...

Immagine del sito
The Future of Society in the Age of Artificial Intelligence
Di Ugo Micci - 03/11/2025

Today, many are wondering what impact the spread of Artificial Intelligence will have on our society. Among the most widespread concerns is the loss of millions of jobs and the resulting unprecedented...

North Korea’s cyberwarfare and its cyber army (part one)

Author: Olivia Terragni Pubblication date: 13/12/2021 During the night, only one bright spot lights up in North Korea: the city of Pyongyang. Perhaps...
Olivia Terragni - 17/12/2021 - 07:07

Making the cyber world a safer and better place: an interview with W1ntermute

Author: Olivia terragni Pubblication Date: 11/11/2021 W1ntermute aka Sofya Ivanov is a woman who works in the cybersecurity industry as a network se...
Olivia Terragni - 12/11/2021 - 11:31

Ada Lovelace and Charles Babbage, pioneers of programmable computing

Author: Antonio Piovesan Pubblication date: 28/09/2021 Introduction - Age of machines Great Britain, middle decades of the 19th century, times of unpr...
Antonio Piovesan - 04/10/2021 - 11:40

Dharma/Crysis: Overview and adversary tracking

Author: Emanuele De Lucia Pubblication date: 17/09/2021 This report presents an overview about Dharma/Crysis ransomware. This piece of malware is o...
Emanuele De Lucia - 17/09/2021 - 19:08

Avoiding the fis-hack-erman’s hook (aka Detecting a Phishing email)

Author: Antonio PiovesanPubblication Date: 09/08/2021 With the increase of ransomware infections - often instigated through phishing emails, it's v...
Antonio Piovesan - 22/08/2021 - 17:17
1 216 217 218

North Korea’s cyberwarfare and its cyber army (part one)

- December 17th, 2021

Author: Olivia Terragni Pubblication date: 13/12/2021 During the night, only one bright spot lights up in North Korea: the city of Pyongyang. Perhaps, due to the dark that surrounds it,...

Facebook Linkedin X

Making the cyber world a safer and better place: an interview with W1ntermute

- November 12th, 2021

Author: Olivia terragni Pubblication Date: 11/11/2021 W1ntermute aka Sofya Ivanov is a woman who works in the cybersecurity industry as a network security analyst and open-source intelligence (OSINT) specialist. This...

Facebook Linkedin X

Ada Lovelace and Charles Babbage, pioneers of programmable computing

- October 4th, 2021

Author: Antonio Piovesan Pubblication date: 28/09/2021 Introduction - Age of machines Great Britain, middle decades of the 19th century, times of unprecedented engineering ambitions. Engineering, transportation, communications, architecture, science and...

Facebook Linkedin X

Dharma/Crysis: Overview and adversary tracking

- September 17th, 2021

Author: Emanuele De Lucia Pubblication date: 17/09/2021 This report presents an overview about Dharma/Crysis ransomware. This piece of malware is often observed as late-stage payload in attacks against internet-facing systems,...

Facebook Linkedin X

Avoiding the fis-hack-erman’s hook (aka Detecting a Phishing email)

- August 22nd, 2021

Author: Antonio PiovesanPubblication Date: 09/08/2021 With the increase of ransomware infections - often instigated through phishing emails, it's very important/crucial to take proactive measures to help protect yourself and your...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE