Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Fortinet 320x100px
970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
WhatsApp Web in the crosshairs! How the worm that distributes the banking Trojan works
Di Redazione RHC - 14/10/2025

Sophos analysts have discovered a complex malware operation by security experts that uses the popular messaging service WhatsApp to spread banking Trojans, targeting Brazilian banks and cryptocurrency...

Immagine del sito
RMPocalypse: A critical bug in AMD SEV-SNP threatens cloud security.
Di Redazione RHC - 13/10/2025

A critical vulnerability has been identified in the AMD SEV-SNP hardware security architecture, impacting major cloud providers (AWS, Microsoft Azure, and Google Cloud) . This flaw allows malicious hy...

Immagine del sito
Spyware yes, spyware no: it’s just a prospect! NSO Group is now under US control.
Di Redazione RHC - 13/10/2025

Israeli company NSO Group, developer of the infamous Pegasus spyware , recently came under the control of American investors. A company spokesperson announced that the new funding amounts to tens of m...

Immagine del sito
DAS: The world’s ear hidden in submarine cables
Di Redazione RHC - 13/10/2025

Over 1.2 million kilometers of fiber optic cables lie on the ocean floor, long considered solely part of a global telecommunications network. However, distributed acoustic sensing (DAS) technology , r...

Immagine del sito
Between AI and fear, Skynet teaches: “We’ll build bunkers before launching AGI.”
Di Redazione RHC - 12/10/2025

The quote, “We’ll definitely build a bunker before we launch AGI,” that inspired the article, was attributed to a Silicon Valley leader, though it’s unclear who exactly he meant by “we.” T...

Will Nvidia’s robotic brain revolutionize artificial intelligence and robotics?

On August 24, the official Nvidia Robotics account shared an image on social media of a black gift box accompanied by a greeting card signed by founde...
Redazione RHC - 21/09/2025 - 09:55

Qilin leads ransomware attacks as new groups emerge underground

Qilin continues to lead the way among all active crypto attack groups, significantly lagging behind its competitors in the number of reported incident...
Redazione RHC - 21/09/2025 - 09:13

RevengeHotels Improves VenomRAT with Artificial Intelligence

Kaspersky Lab experts have detected a new wave of attacks by the RevengeHotels group. A distinctive feature of this campaign is that many of the new m...
Redazione RHC - 21/09/2025 - 08:54

Security Alert: Vulnerability in Ivanti Endpoint Manager Mobile. CISA Warns

The U.S. Cybersecurity Agency (CISA) has issued an alert regarding two malware kits discovered on the network of an unidentified organization after ex...
Redazione RHC - 21/09/2025 - 08:42

Root in less than two minutes: How Phoenix exploits vulnerabilities in DDR5 module TRRs.

Anew variant of Rowhammer attacks has been developed that can bypass the latest security mechanisms in SK Hynix DDR5 chips. Dubbed Phoenix, the attack...
Redazione RHC - 20/09/2025 - 15:33

China kicks off the race for innovation with its first AI competition

The city of Karamay, Xinjiang, hosted the opening of the finals and exhibition of the first AI Applications Competition. The event, held at the Museum...
Redazione RHC - 20/09/2025 - 12:44
1 34 35 36 37 38 187

Will Nvidia’s robotic brain revolutionize artificial intelligence and robotics?

- September 21st, 2025

On August 24, the official Nvidia Robotics account shared an image on social media of a black gift box accompanied by a greeting card signed by founder Jensen Huang, with...

Facebook Linkedin X

Qilin leads ransomware attacks as new groups emerge underground

- September 21st, 2025

Qilin continues to lead the way among all active crypto attack groups, significantly lagging behind its competitors in the number of reported incidents. According to a recent Cyble report, the...

Facebook Linkedin X

RevengeHotels Improves VenomRAT with Artificial Intelligence

- September 21st, 2025

Kaspersky Lab experts have detected a new wave of attacks by the RevengeHotels group. A distinctive feature of this campaign is that many of the new malware samples were created...

Facebook Linkedin X

Security Alert: Vulnerability in Ivanti Endpoint Manager Mobile. CISA Warns

- September 21st, 2025

The U.S. Cybersecurity Agency (CISA) has issued an alert regarding two malware kits discovered on the network of an unidentified organization after exploiting new vulnerabilities in the Ivanti Endpoint Manager...

Facebook Linkedin X

Root in less than two minutes: How Phoenix exploits vulnerabilities in DDR5 module TRRs.

- September 20th, 2025

Anew variant of Rowhammer attacks has been developed that can bypass the latest security mechanisms in SK Hynix DDR5 chips. Dubbed Phoenix, the attack allows root access to DDR5-based systems...

Facebook Linkedin X

China kicks off the race for innovation with its first AI competition

- September 20th, 2025

The city of Karamay, Xinjiang, hosted the opening of the finals and exhibition of the first AI Applications Competition. The event, held at the Museum of Science and Technology, saw...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE