Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Red Hot Cyber Academy

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

In Nepal, people are dying for social media! 19 people lost their lives trying to get Facebook back
Di Redazione RHC - 09/09/2025

In a dramatic reversal, Nepal has lifted the nationwide social media blackout imposed last week after it sparked massive youth protests and caused at least 19 deaths, according to local media. The dec...

Xi Jinping and the Chinese APT’s Ambition
Di Alessio Stefan - 08/09/2025

The post-COVID macro political movements, including ongoing conflicts, have prompted a majority of states to shift their medium- to long-term political objectives. Clearly, a paradigm shift has been v...

Salesloft Cyber Attack: Chatbot Drift Temporarily Disabled
Di Redazione RHC - 07/09/2025

Salesloft announced that it would temporarily deactivate its AI-powered chatbot Drift on September 5, after several companies were hit by a massive supply chain attack. The incident resulted in the ma...

Discover the Dark Web: Access, Secrets, and Helpful Links to the Onion Network
Di Redazione RHC - 06/09/2025

The Dark Web is a part of the internet that cannot be reached with standard browsers (Chrome, Firefox, Edge). To access it, you need to use specific tools like the Tor Browser, which guarantees anonym...

AI A2 detected 102 0-day bugs and created exploits in Android apps for $1.77
Di Redazione RHC - 06/09/2025

Artificial intelligence systems have been criticized for creating confusing vulnerability reports and inundating open-source developers with irrelevant complaints. But researchers at Nanjing Universit...

Google Chrome goes privacy-first! A new script blocker for incognito mode

Google is testing a new feature to improve privacy in Chrome's incognito mode on Windows: incognito script blocking (PrivacySandboxFingerprintingProte...
Redazione RHC - 16/08/2025 - 06:59

Musk reveals he may lose control of Tesla

Musk recently stated publicly that his control over the company is precarious and that he "could be ousted." The controversy arose from Musk's publicl...
Redazione RHC - 16/08/2025 - 06:39

After 18 years of silence, Anne begins to speak again. The new BCI technology from the University of Berkeley

Eighteen years after a brainstem stroke left Anne Johnson almost completely paralyzed, she's now using a brain-computer interface (BCI) that converts ...
Redazione RHC - 16/08/2025 - 06:33

Will drones on missions be able to autonomously decide which men to kill?

It appears that the United States has already seriously considered the concept of autonomous warfare. DARPA's autonomous fighter jet, capable of unman...
Redazione RHC - 15/08/2025 - 19:11

After the laundry, Figure 02 now folds the laundry. But for now, you’ll have to continue doing it yourself.

Just two weeks ago, the humanoid robot produced by Figure amazed us when it deftly removed clothes from a laundry basket and placed them in a washing ...
Redazione RHC - 15/08/2025 - 16:14

Did you respond to IT support on Teams? Congratulations! The Trojan is on your PC with rights that exceed yours.

The research team at Trustwave SpiderLabs has identified a new wave of EncryptHub attacks that combine human error and the exploitation of a vulnerabi...
Redazione RHC - 15/08/2025 - 14:42
1 37 38 39 40 41 137

Google Chrome goes privacy-first! A new script blocker for incognito mode

- August 16th, 2025

Google is testing a new feature to improve privacy in Chrome's incognito mode on Windows: incognito script blocking (PrivacySandboxFingerprintingProtectionEnabled). This feature will block third-party scripts that use fingerprinting techniques to...

  

Musk reveals he may lose control of Tesla

- August 16th, 2025

Musk recently stated publicly that his control over the company is precarious and that he "could be ousted." The controversy arose from Musk's publicly expressed concerns about his stake. Musk...

  

After 18 years of silence, Anne begins to speak again. The new BCI technology from the University of Berkeley

- August 16th, 2025

Eighteen years after a brainstem stroke left Anne Johnson almost completely paralyzed, she's now using a brain-computer interface (BCI) that converts speech directly from brain signals. In 2005, at age...

  

Will drones on missions be able to autonomously decide which men to kill?

- August 15th, 2025

It appears that the United States has already seriously considered the concept of autonomous warfare. DARPA's autonomous fighter jet, capable of unmanned combat, is no longer considered a breakthrough: the...

  

After the laundry, Figure 02 now folds the laundry. But for now, you’ll have to continue doing it yourself.

- August 15th, 2025

Just two weeks ago, the humanoid robot produced by Figure amazed us when it deftly removed clothes from a laundry basket and placed them in a washing machine. This was...

  

Did you respond to IT support on Teams? Congratulations! The Trojan is on your PC with rights that exceed yours.

- August 15th, 2025

The research team at Trustwave SpiderLabs has identified a new wave of EncryptHub attacks that combine human error and the exploitation of a vulnerability in the Microsoft Management Console. Operators...

  

Sign up for the newsletter