Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

- June 27th, 2025 - (Posted in Cybercrime and Darknet)
An unusual example of malicious code has been discovered in a real computing environment, which for the first time recorded an attempt to attack not classical defense mechanisms, but directly artificial intelligence systems. We are talking about the prompt injection technique, i.e. the introduction of hidden instructions capable of compromising...
Technology Evolution

Ada Lovelace and Charles Babbage, pioneers of programmable computing

Author: Antonio Piovesan Pubblication date: 28/09/2021 Introduction – Age of machines Great Britain, middle decades of the 19th century, times of unprecedented engineering ambitions. Engineering, transportation, communications, architecture, science and manufacturing are in a feverish state of evolution. Inventors and

Critical Vulnerabilities in Splunk Enterprise Enable Remote Code Execution

- July 3rd, 2024

Splunk, a leading provider of software for searching, monitoring, and analyzing machine-generated big data, has released urgent security updates for its flagship product, Splunk Enterprise. These updates address multiple critical...

  

The Reversal of the Brain Cipher Group after the Attack on Indonesia Terkoneksi

- July 3rd, 2024

In recent days, the ransomware group known as Brain Cipher severely hit the data center of Indonesia Terkoneksi, an attack that crippled the company's technological infrastructure. However, in a surprising...

  

New Group Ransomware ‘Pryx’ Compromises 30,000 College Enrollment Data!

- July 3rd, 2024

A new player has emerged on the cybercrime landscape: the ransomware group "Pryx." Pryx has claimed its first significant attack, announcing that it has compromised the systems of Rowan College...

  

Intel CPUs Vulnerable! New “Indirector” Attack Threatens Sensitive Data Detection.

- July 3rd, 2024

Modern Intel processors, including Raptor Lake and Alder Lake CPUs (i.e., 12th and 13th generation Intel "Core" processors), are vulnerable to a new high-precision Branch Target Injection (BTI) attack called...

  

Sign up for the newsletter