Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Mobile
970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Hanyuan-1: China’s room-temperature quantum computer challenges the US
Di Redazione RHC - 03/11/2025

China’s first atomic quantum computer has reached a major commercial milestone, recording its first sales to domestic and international customers, according to state media. The Hubei Daily, a st...

Immagine del sito
Inside NVIDIA: Jensen Huang leads 36 managers, 36,000 employees, and reads 20,000 emails a day
Di Redazione RHC - 03/11/2025

NVIDIA CEO Jen-Hsun Huang now directly oversees 36 employees across seven key areas: strategy, hardware, software, artificial intelligence, public relations, networking, and executive assistants. This...

Immagine del sito
Will Bug Hunters Be Out of Work? OpenAI Introduces Aardvark, Its New Bug Fixer
Di Redazione RHC - 03/11/2025

OpenAI has unveiled Aardvark, an autonomous assistant based on the GPT-5 model , designed to automatically find and fix vulnerabilities in software code. This AI tool, dubbed a “security researc...

Immagine del sito
The Louvre Theft: How Password Governance Can Undermine Security
Di Redazione RHC - 03/11/2025

“When the Key Is ‘Louvre’ – The Theft That Teaches How Password Governance Can Shake Even the Most Violable Fortresses” On October 19, 2025, the Louvre Museum was the sce...

Immagine del sito
The Future of Society in the Age of Artificial Intelligence
Di Ugo Micci - 03/11/2025

Today, many are wondering what impact the spread of Artificial Intelligence will have on our society. Among the most widespread concerns is the loss of millions of jobs and the resulting unprecedented...

A PNG containing a Trojan. Astaroth persistently abuses GitHub.

McAfee researchers have reported new activity by the Astaroth banking trojan , which has started using GitHub as a persistent channel for distributing...
Redazione RHC - 14/10/2025 - 16:02

Satellites targeted! Thousands of phone conversations and text messages intercepted.

Satellite communications links used by government agencies, the military, businesses, and mobile operators have been discovered to be the source of a ...
Redazione RHC - 14/10/2025 - 12:44

Internet Explorer is “dead,” but it continues to infect PCs with its bugs via Edge

While Internet Explorer has officially been out of support since June 2022, Microsoft recently faced a threat that exploited Internet Explorer Mode (I...
Luca Galuppi - 14/10/2025 - 12:20

Nanochat: Create your own LLM, train it, and get it running on your PC for $100

Developer Andrej Karpathy has unveiled nanochat , a minimalist, fully open-source version of ChatGPT that can be trained and run on a single computer....
Redazione RHC - 14/10/2025 - 09:38

Jeff Bezos at Italian Tech Week: “Millions of people will live in space.”

Data centers in space, lunar landers, Martian missions: the future designed by Bezos in Turin. But the real revelation is the anecdote about his grand...
Carlo Denza - 14/10/2025 - 07:25

WhatsApp Web in the crosshairs! How the worm that distributes the banking Trojan works

Sophos analysts have discovered a complex malware operation by security experts that uses the popular messaging service WhatsApp to spread banking Tro...
Redazione RHC - 14/10/2025 - 07:20
1 31 32 33 34 35 218

A PNG containing a Trojan. Astaroth persistently abuses GitHub.

- October 14th, 2025

McAfee researchers have reported new activity by the Astaroth banking trojan , which has started using GitHub as a persistent channel for distributing configuration data. This approach allows attackers to...

Facebook Linkedin X

Satellites targeted! Thousands of phone conversations and text messages intercepted.

- October 14th, 2025

Satellite communications links used by government agencies, the military, businesses, and mobile operators have been discovered to be the source of a massive data leak. Researchers at the University of...

Facebook Linkedin X

Internet Explorer is “dead,” but it continues to infect PCs with its bugs via Edge

- October 14th, 2025

While Internet Explorer has officially been out of support since June 2022, Microsoft recently faced a threat that exploited Internet Explorer Mode (IE Mode) in Edge , which was designed...

Facebook Linkedin X

Nanochat: Create your own LLM, train it, and get it running on your PC for $100

- October 14th, 2025

Developer Andrej Karpathy has unveiled nanochat , a minimalist, fully open-source version of ChatGPT that can be trained and run on a single computer. Designed as a learning platform for...

Facebook Linkedin X

Foto: Ufficio Stampa Italian Tech Wee

Jeff Bezos at Italian Tech Week: “Millions of people will live in space.”

- October 14th, 2025

Data centers in space, lunar landers, Martian missions: the future designed by Bezos in Turin. But the real revelation is the anecdote about his grandfather that reveals his human profile....

Facebook Linkedin X

WhatsApp Web in the crosshairs! How the worm that distributes the banking Trojan works

- October 14th, 2025

Sophos analysts have discovered a complex malware operation by security experts that uses the popular messaging service WhatsApp to spread banking Trojans, targeting Brazilian banks and cryptocurrency exchanges. A self-replicating...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE