Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

In Nepal, people are dying for social media! 19 people lost their lives trying to get Facebook back
Di Redazione RHC - 09/09/2025

In a dramatic reversal, Nepal has lifted the nationwide social media blackout imposed last week after it sparked massive youth protests and caused at least 19 deaths, according to local media. The dec...

Xi Jinping and the Chinese APT’s Ambition
Di Alessio Stefan - 08/09/2025

The post-COVID macro political movements, including ongoing conflicts, have prompted a majority of states to shift their medium- to long-term political objectives. Clearly, a paradigm shift has been v...

Salesloft Cyber Attack: Chatbot Drift Temporarily Disabled
Di Redazione RHC - 07/09/2025

Salesloft announced that it would temporarily deactivate its AI-powered chatbot Drift on September 5, after several companies were hit by a massive supply chain attack. The incident resulted in the ma...

Discover the Dark Web: Access, Secrets, and Helpful Links to the Onion Network
Di Redazione RHC - 06/09/2025

The Dark Web is a part of the internet that cannot be reached with standard browsers (Chrome, Firefox, Edge). To access it, you need to use specific tools like the Tor Browser, which guarantees anonym...

AI A2 detected 102 0-day bugs and created exploits in Android apps for $1.77
Di Redazione RHC - 06/09/2025

Artificial intelligence systems have been criticized for creating confusing vulnerability reports and inundating open-source developers with irrelevant complaints. But researchers at Nanjing Universit...

“Son, get access to your dad’s smartphone!” Sharp increase in fraud involving minors

F6 has reported a sharp increase in fraud in which criminals exploit minors to access their parents' bank accounts. According to analysts, approximate...
Redazione RHC - 25/08/2025 - 10:01

Windows 11 Insider Preview: New features and improvements ahead

Microsoft has released a new build 26200.5761 (KB5064093) of Windows 11 Insider Preview to Windows Insiders in the Dev Channel. The update introduces ...
Redazione RHC - 25/08/2025 - 08:43

PoC Zero-Click Exploit on iPhone and Mac: How Two Bytes Can Compromise the Apple Ecosystem

An in-depth analysis and proof-of-concept example has been released regarding CVE-2025-43300, a critical security flaw in Apple's image processing inf...
Redazione RHC - 25/08/2025 - 08:38

Your kidneys for sale on the dark web! The DaVita ransomware attack affects 2.4 million patients

DaVita, an American company that operates a network of over 2,600 hemodialysis centers in the United States, reported a serious loss of patient person...
Redazione RHC - 24/08/2025 - 14:14

ChatGPT, will it be your new life companion? Humans are saying goodnight to AI

The artificial intelligence revolution is transforming not only work and productivity, but also personal relationships. More and more users report for...
Redazione RHC - 24/08/2025 - 11:16

DeepSeek launches version 3.1 of its AI model with support for Chinese chips

There was a day when DeepSeek surprised half the world by demonstrating that much could be done with less. Today it returns with version 3.1 and a mes...
Redazione RHC - 24/08/2025 - 10:03
1 27 28 29 30 31 136

“Son, get access to your dad’s smartphone!” Sharp increase in fraud involving minors

- August 25th, 2025

F6 has reported a sharp increase in fraud in which criminals exploit minors to access their parents' bank accounts. According to analysts, approximately 3,500 such cases were recorded in the...

  

Windows 11 Insider Preview: New features and improvements ahead

- August 25th, 2025

Microsoft has released a new build 26200.5761 (KB5064093) of Windows 11 Insider Preview to Windows Insiders in the Dev Channel. The update introduces several exciting features and improvements that will...

  

PoC Zero-Click Exploit on iPhone and Mac: How Two Bytes Can Compromise the Apple Ecosystem

- August 25th, 2025

An in-depth analysis and proof-of-concept example has been released regarding CVE-2025-43300, a critical security flaw in Apple's image processing infrastructure that allows remote code execution without the need for a...

  

Your kidneys for sale on the dark web! The DaVita ransomware attack affects 2.4 million patients

- August 24th, 2025

DaVita, an American company that operates a network of over 2,600 hemodialysis centers in the United States, reported a serious loss of patient personal data following a ransomware attack. According...

  

ChatGPT, will it be your new life companion? Humans are saying goodnight to AI

- August 24th, 2025

The artificial intelligence revolution is transforming not only work and productivity, but also personal relationships. More and more users report forming real emotional bonds with chatbots, to the point of...

  

DeepSeek launches version 3.1 of its AI model with support for Chinese chips

- August 24th, 2025

There was a day when DeepSeek surprised half the world by demonstrating that much could be done with less. Today it returns with version 3.1 and a message that doesn't...

  

Sign up for the newsletter