Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Enterprise BusinessLog 320x200 1
970x20 Itcentric

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
China will overtake the US in the AI race! Nvidia CEO warns, “We’re stuck in cynicism.”
Di Redazione RHC - 07/11/2025

Nvidia CEO Jensen Huang has warned that China will defeat the United States in the artificial intelligence (AI) race. The FT reported that Huang, at the Future of AI Summit hosted by the Financial Tim...

Immagine del sito
Tesla wants to give Musk 1,000 billion dollars for a science fiction plan. More than the GDP of Switzerland!
Di Redazione RHC - 07/11/2025

Numerous accolades are pouring in for Elon Musk, who continues to deftly lead his empire’s multiple businesses, including Tesla, SpaceX, xAI, and Starlink , maintaining his firm hold on the top spot...

Immagine del sito
Highly advanced, adaptive malware uses AI to confuse security defenses
Di Redazione RHC - 07/11/2025

Based on a recent analysis by the Google Threat Intelligence Group (GTIG), a shift has been identified among threat actors over the past year. Continuous improvements in the underground for AI abuse A...

Immagine del sito
The Louvre’s security myth crumbles! Between audits, ridiculous passwords, and outdated cameras.
Di Redazione RHC - 07/11/2025

The recent theft at the Louvre Museum, located in the heart of Paris, has shocked not only the art world but also the cybersecurity world. On the night of October 22, 2025, several French crown jewels...

Immagine del sito
Double-dealing: employees of a company that resolved ransomware attacks were launching them themselves
Di Redazione RHC - 07/11/2025

Three former DigitalMint employees, who investigated ransomware incidents and negotiated with ransomware groups, are accused of hacking into the networks of five American companies. According to the U...

Dharma/Crysis: Overview and adversary tracking

Author: Emanuele De Lucia Pubblication date: 17/09/2021 This report presents an overview about Dharma/Crysis ransomware. This piece of malware is o...
Emanuele De Lucia - 17/09/2021 - 19:08

Avoiding the fis-hack-erman’s hook (aka Detecting a Phishing email)

Author: Antonio PiovesanPubblication Date: 09/08/2021 With the increase of ransomware infections - often instigated through phishing emails, it's v...
Antonio Piovesan - 22/08/2021 - 17:17
1 223 224 225

Dharma/Crysis: Overview and adversary tracking

- September 17th, 2021

Author: Emanuele De Lucia Pubblication date: 17/09/2021 This report presents an overview about Dharma/Crysis ransomware. This piece of malware is often observed as late-stage payload in attacks against internet-facing systems,...

Facebook Linkedin X

Avoiding the fis-hack-erman’s hook (aka Detecting a Phishing email)

- August 22nd, 2021

Author: Antonio PiovesanPubblication Date: 09/08/2021 With the increase of ransomware infections - often instigated through phishing emails, it's very important/crucial to take proactive measures to help protect yourself and your...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE