Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Mobile
970x20 Itcentric

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
China is using artificial intelligence to improve mass surveillance
Di Redazione RHC - 06/11/2025

In Beijing, in a banquet hall of a luxury hotel, police officers from across the country attended a conference dedicated to the application of artificial intelligence to public safety . The event open...

Immagine del sito
Rust Rebels! Fund Launched to Pay Open Source Maintainers
Di Redazione RHC - 06/11/2025

The Rust Foundation has announced the launch of the Maintainers Fund, a new program designed to support developers responsible for the stability and development of the Rust ecosystem. This step aims t...

Immagine del sito
12.5 million HD movies per second! Amazon’s undersea cable will connect the US to Ireland.
Di Redazione RHC - 06/11/2025

In a few years, Ireland and the United States will be connected by an undersea communications cable designed to help Amazon improve its AWS services. Undersea cables are a vital part of the infrastruc...

Immagine del sito
They told you 6G would be fast, right? But they didn’t tell you the whole truth
Di Sandro Sana - 06/11/2025

It’s not “ just faster ”: 6G changes the very nature of the network! When we talk about 6G, we risk reducing everything to a speed upgrade, as if the network of the future were simply a 5G w...

Immagine del sito
Microsoft Exchange Server Penetration Testing: Techniques, Tools, and Countermeasures
Di Alessandro Molinari - 06/11/2025

Often, during penetration testing, we find ourselves with elevated access (Domain Admin) within an organization. Some companies stop there, thinking that obtaining Domain Admin is the ultimate goal. B...

Microsoft Edge protects Internet Explorer mode from attacks

The Microsoft Edge security team made significant changes to Internet Explorer mode after receiving confirmation of targeted attacks using it. Experts...
Redazione RHC - 24/10/2025 - 07:27

Canada’s craft beer competition ends in chaos over AI judges

A major Canadian craft beer competition has become the center of controversy after unexpectedly introducing artificial intelligence into the beverage ...
Redazione RHC - 24/10/2025 - 07:13

Artificial General Intelligence (AGI): the first global standard for measuring it has been defined

On October 21, 2025, an international team of researchers from 29 leading institutions—including Stanford University, MIT, and the University of Calif...
Redazione RHC - 23/10/2025 - 20:59

$2.5 billion: The cost of the Jaguar Land Rover cyber attack.

Jaguar Land Rover continues to deal with the fallout from the cyber attack that paralyzed production, disrupted its dealer network, and jeopardized su...
Redazione RHC - 23/10/2025 - 18:35

Court orders NSO Group to stop using spyware against WhatsApp

A federal court has ordered Israeli company NSO Group (developer of the commercial spyware Pegasus) to stop using spyware to target and attack WhatsAp...
Redazione RHC - 23/10/2025 - 16:47

A serious bug in Microsoft 365 Copilot leads to data exfiltration via prompts

An advanced security flaw exists in M365 Copilot that allows attackers to exfiltrate sensitive information from tenants, such as recent emails, throug...
Redazione RHC - 23/10/2025 - 13:30
1 20 21 22 23 24 223

Microsoft Edge protects Internet Explorer mode from attacks

- October 24th, 2025

The Microsoft Edge security team made significant changes to Internet Explorer mode after receiving confirmation of targeted attacks using it. Experts discovered that attackers exploited vulnerabilities in the outdated Chakra...

Facebook Linkedin X

Canada’s craft beer competition ends in chaos over AI judges

- October 24th, 2025

A major Canadian craft beer competition has become the center of controversy after unexpectedly introducing artificial intelligence into the beverage judging process. The decision to integrate algorithms without warning sparked...

Facebook Linkedin X

Artificial General Intelligence (AGI): the first global standard for measuring it has been defined

- October 23rd, 2025

On October 21, 2025, an international team of researchers from 29 leading institutions—including Stanford University, MIT, and the University of California, Berkeley —completed a study that marks a milestone in...

Facebook Linkedin X

$2.5 billion: The cost of the Jaguar Land Rover cyber attack.

- October 23rd, 2025

Jaguar Land Rover continues to deal with the fallout from the cyber attack that paralyzed production, disrupted its dealer network, and jeopardized supply chains. Vehicle production at major UK plants...

Facebook Linkedin X

Court orders NSO Group to stop using spyware against WhatsApp

- October 23rd, 2025

A federal court has ordered Israeli company NSO Group (developer of the commercial spyware Pegasus) to stop using spyware to target and attack WhatsApp users. Please note that Pegasus is...

Facebook Linkedin X

A serious bug in Microsoft 365 Copilot leads to data exfiltration via prompts

- October 23rd, 2025

An advanced security flaw exists in M365 Copilot that allows attackers to exfiltrate sensitive information from tenants, such as recent emails, through indirect command injection. Security researcher Adam Logue detailed...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE