Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Ransomfeed 320x100 1
Redhotcyber Banner Sito 970x120px Uscita 101125

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

The Power of A* Algorithm in Artificial Intelligence and Robotics Cybercrime

The Power of A* Algorithm in Artificial Intelligence and Robotics

Nearly everything artificial intelligence does today is based on a simple but fundamental idea: any problem can be reduced to...
Redazione RHC - 30 November 2025
WhatsApp Messages Contain Hidden GPS Data, Expert Warns Cybercrime

WhatsApp Messages Contain Hidden GPS Data, Expert Warns

According to computer forensics expert Elom Daniel, WhatsApp messages can contain hidden geolocation data even when the user hasn't intentionally...
Redazione RHC - 30 November 2025
DeepSeekMath-V2 Revolutionizes Math with AI-Powered Proof Verification Cybercrime

DeepSeekMath-V2 Revolutionizes Math with AI-Powered Proof Verification

The Chinese company DeepSeek has introduced a new specialized model for solving mathematical problems , DeepSeekMath-V2. This large-scale language model,...
Redazione RHC - 30 November 2025
Shai-Hulud Attack: npm Supply Chain Compromised Again Cybercrime

Shai-Hulud Attack: npm Supply Chain Compromised Again

The npm ecosystem is once again at the center of a large-scale supply chain attack attributed to the Shai-Hulud campaign....
Redazione RHC - 30 November 2025
ChatGPT to Introduce Targeted Ads, Changing Monetization Strategy Cybercrime

ChatGPT to Introduce Targeted Ads, Changing Monetization Strategy

Until now, ChatGPT has been ad-free: no banners, no hidden promotions. Even the paid versions worked without pushy offers. But...
Redazione RHC - 29 November 2025
GitLab Security Updates Fix High-Severity Vulnerabilities CVE-2024-9183 Cybercrime

GitLab Security Updates Fix High-Severity Vulnerabilities CVE-2024-9183

GitLab has released critical security updates for its Community Edition (CE) and Enterprise Edition (EE) to address several high-severity vulnerabilities...
Redazione RHC - 29 November 2025

Salt Typhoon (RedMike): The Chinese Cyber Threat That’s Shaking the World

In recent months, the Chinese hacking group known as Salt Typhoon has continued to make headlines for its aggressive and persistent cybersecurity tactics. Despite US sanctions and close government surveillance,...
Share on Facebook Share on LinkedIn Share on X

Remember NVIDIA DGX Spark? Here comes the GMKtec EVO-X2, at half the price.

Chinese manufacturer GMKtec has presented its new EVO-X2 mini PC , equipped with a Ryzen AI Max+ 395 processor , claiming performance comparable – and in some cases superior –...
Share on Facebook Share on LinkedIn Share on X

Did the US steal 127,000 Bitcoins? China accuses Washington of a massive hack.

We're talking about 11 billion euros. A staggering figure! China's National Computer Virus Emergency Response Center (CVERC) said that a state-run entity, likely U.S. , was behind a 2020 attack...
Share on Facebook Share on LinkedIn Share on X

The Most Famous Hackers: The Story of Kevin Mitnick, AKA the Condor

Kevin Mitnick (code name Condor) is perhaps the most famous hacker of all time. He is an American hacker, IT security consultant, ethical hacking expert, public speaker, and writer. He...
Share on Facebook Share on LinkedIn Share on X

Synology fixes a zero-day bug in BeeStation OS. Researchers receive $40,000.

Synology has patched a zero-day vulnerability in its BeeStation devices, demonstrated during the recent Pwn2Own competition. The bug, identified as CVE-2025-12686, falls under the category of "buffer copying without input...
Share on Facebook Share on LinkedIn Share on X

Connecting to public Wi-Fi? Even HTTPS isn’t safe! Let’s find out with this tutorial.

Many people believe that accessing only HTTPS sites is enough to ensure security when browsing on unsecured Wi-Fi networks. Spoiler alert: this belief is also a false sense of security....
Share on Facebook Share on LinkedIn Share on X

Myths and DNS Spoofing: If I Don’t Make Payments or Log In Online, Am I Really Safe?

It's often thought that avoiding online dangers is as simple as not making payments or entering credentials while browsing. This approach, while seemingly prudent, is profoundly flawed for several reasons—especially...
Share on Facebook Share on LinkedIn Share on X

Protecting your WiFi by hiding the name? This is a false sense of security

Security, especially when it comes to WiFi networks, is often the subject of misunderstandings and clichés. In this series of articles in our WiFI column , we aim to debunk...
Share on Facebook Share on LinkedIn Share on X

Open WiFi Networks: A Fertile Ground for Cybercrime

Nowadays, the proliferation of portable, wearable, and other smart devices has made data exchange, access to resources, and web browsing indispensable. This in-depth look at Wi-Fi focuses on a widely...
Share on Facebook Share on LinkedIn Share on X

Midnight Ransomware: A free decryptor has been released thanks to a bug in the code.

Researchers have discovered a vulnerability in the new Midnight ransomware , based on the old Babuk source code. The malware is marketed as an "advanced" version of the malware, but...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCulture
Long-Lived Technologies: COBOL, C, SQL, and Legacy Systems
Redazione RHC - 02/01/2026

While the industry debates which neural network is the “smartest” and which framework is the “most modern,” decades-old technologies continue to quietly swirl beneath the surface of the banking industry . This year, COBOL turned…

Immagine del sitoCybercrime
Finland Seizes Ship in Cable Damage Probe, Cites Security Threat
Redazione RHC - 31/12/2025

On Wednesday, December 31, Finnish authorities seized a cargo ship believed to be involved in the damage to an undersea telecommunications cable connecting Helsinki to Tallinn, Estonia. The action was triggered after a technical anomaly…

Immagine del sitoCybercrime
Ransomware Attacks on the Rise: US Professionals Turn to Cybercrime
Redazione RHC - 31/12/2025

In the landscape of cybercrime investigations, some cases take on particular significance not only because of the extent of the financial damage, but also because of the profile of the individuals involved . Ransomware investigations,…

Immagine del sitoCybercrime
The Dark Side of Cybercrime: Human Costs and Consequences
Redazione RHC - 31/12/2025

By 2025, cybercrime will increasingly go beyond “just money”: attacks aren’t just about downtime bills and ransom payments , but also about real human consequences, from healthcare disruptions and victim harassment to kidnappings, torture, and…

Immagine del sitoCybercrime
OpenAI Hiring Chief Security Officer to Mitigate AI Risks
Redazione RHC - 30/12/2025

OpenAI, the developer of ChatGPT, has announced the search for a new Chief Security Officer . The position, with an annual salary of $555,000, will be directly responsible for mitigating risks associated with artificial intelligence…