Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
320×100
Fortinet 970x120px

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
100 years of Italian Intelligence! Mattarella celebrates the SIM’s centenary at the Quirinale Palace
Di Redazione RHC - 16/10/2025

October 15, 2025 marks an anniversary of exceptional importance in the history of Italian national security: one hundred years since the birth of the Military Information Service (SIM) , the country&#...

Immagine del sito
But what kind of Sovereign AI is running on the servers and algorithms of a US company!
Di Redazione RHC - 16/10/2025

This year, OpenAI announced a series of projects with foreign governments to create “sovereign AI” systems. According to the company, some of these agreements are currently being negotiate...

Immagine del sito
Flirt, eroticism, and the end of censorship! OpenAI will change the rules of ChatGPT.
Di Redazione RHC - 15/10/2025

OpenAI is preparing a major change to ChatGPT’s rules: starting in December, age-verified users will be able to interact with adult content, including erotica. The company’s CEO, Sam Altma...

Immagine del sito
“Double Bind” Leads to GPT-5 Jailbreak: The AI That Was Convinced It Was Schizophrenic
Di Luca Vinciguerra - 15/10/2025

A new and unusual jailbreaking method, the art of circumventing the limitations imposed on artificial intelligence, has reached our editorial office. It was developed by computer security researcher A...

Immagine del sito
AI Alignment: Where Does AI Learn Right and Wrong?
Di Sergio Corpettini - 14/10/2025

The other day on LinkedIn, I found myself having a conversation with someone who was seriously interested in the topic of artificial intelligence applied to law. It wasn’t one of those barroom c...

The “non-sensitive data” trap: the costly mistake for companies

A wonderfully widespread argument among those who work with personal data is that of underestimating the risks or refusing to address them at all. Thi...
Stefano Gazzella - 01/10/2025 - 15:17

With 50 dollars and physical access to the server, the Cloud goes to hell

A team of researchers has developed a simple hardware tool that challenges the fundamental principles of trusted computing in modern cloud environment...
Redazione RHC - 01/10/2025 - 12:10

Discovering the Emotional Firewall! The Vulnerability No One Is Patching

There is one critical issue in the cyber arena that we have not yet patched: our emotional firewall . This is not a network problem, but a collective ...
Daniela Farina - 01/10/2025 - 10:17

Not the children! 8,000 personal data of children from a nursery school are at risk of being published.

A criminal hacker group calling itself Radiant has claimed responsibility for stealing the personal data of over 8,000 children enrolled in daycare ce...
Redazione RHC - 01/10/2025 - 07:58

Programming in crisis: Junior job openings plummet as AI transforms the workplace.

Artificial intelligence is no longer a futuristic concept from science fiction films . It is already part of our daily lives and, above all, it is rev...
Redazione RHC - 01/10/2025 - 07:36

Work, Artificial Intelligence, and Marketing: What Skills Will We Need in 2025?

In recent years, the marketing industry has undergone a radical transformation : today, one in two positions requires artificial intelligence skills. ...
Redazione RHC - 30/09/2025 - 23:07
1 20 21 22 23 24 191

The “non-sensitive data” trap: the costly mistake for companies

- October 1st, 2025

A wonderfully widespread argument among those who work with personal data is that of underestimating the risks or refusing to address them at all. This is the belief that there's...

Facebook Linkedin X

With 50 dollars and physical access to the server, the Cloud goes to hell

- October 1st, 2025

A team of researchers has developed a simple hardware tool that challenges the fundamental principles of trusted computing in modern cloud environments. Using a device costing less than $50, they...

Facebook Linkedin X

Discovering the Emotional Firewall! The Vulnerability No One Is Patching

- October 1st, 2025

There is one critical issue in the cyber arena that we have not yet patched: our emotional firewall . This is not a network problem, but a collective mental block....

Facebook Linkedin X

Not the children! 8,000 personal data of children from a nursery school are at risk of being published.

- October 1st, 2025

A criminal hacker group calling itself Radiant has claimed responsibility for stealing the personal data of over 8,000 children enrolled in daycare centers run by London-based Kido International . The...

Facebook Linkedin X

Programming in crisis: Junior job openings plummet as AI transforms the workplace.

- October 1st, 2025

Artificial intelligence is no longer a futuristic concept from science fiction films . It is already part of our daily lives and, above all, it is revolutionizing the world of...

Facebook Linkedin X

Work, Artificial Intelligence, and Marketing: What Skills Will We Need in 2025?

- September 30th, 2025

In recent years, the marketing industry has undergone a radical transformation : today, one in two positions requires artificial intelligence skills. According to representatives from the agency Digital Duke, the...

Facebook Linkedin X
Most Read Articles of the Month Most Read Articles of the Week
  1. The Truth About Windows XP License Key: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8
  2. Computer science graduates with no future! Thousands of resumes ignored, and goodbye to six-figure salaries.
  3. With 50 dollars and physical access to the server, the Cloud goes to hell
  4. Shocking collapse: -71% of job offers for software engineers in three years
  5. Hackers hit the United States: critical federal infrastructure compromised
  1. The Truth About Windows XP License Key: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8
  2. Microsoft 365 Outage: Thousands of Users Affected Worldwide
  3. GitHub is migrating to Azure! And goodbye to new development for a year.
  4. Is your VPN protecting you or spying on you? 800 free VPNs analyzed with disturbing results.
  5. WhatsApp Web in the crosshairs! How the worm that distributes the banking Trojan works

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE