Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

In Nepal, people are dying for social media! 19 people lost their lives trying to get Facebook back
Di Redazione RHC - 09/09/2025

In a dramatic reversal, Nepal has lifted the nationwide social media blackout imposed last week after it sparked massive youth protests and caused at least 19 deaths, according to local media. The dec...

Xi Jinping and the Chinese APT’s Ambition
Di Alessio Stefan - 08/09/2025

The post-COVID macro political movements, including ongoing conflicts, have prompted a majority of states to shift their medium- to long-term political objectives. Clearly, a paradigm shift has been v...

Salesloft Cyber Attack: Chatbot Drift Temporarily Disabled
Di Redazione RHC - 07/09/2025

Salesloft announced that it would temporarily deactivate its AI-powered chatbot Drift on September 5, after several companies were hit by a massive supply chain attack. The incident resulted in the ma...

Discover the Dark Web: Access, Secrets, and Helpful Links to the Onion Network
Di Redazione RHC - 06/09/2025

The Dark Web is a part of the internet that cannot be reached with standard browsers (Chrome, Firefox, Edge). To access it, you need to use specific tools like the Tor Browser, which guarantees anonym...

AI A2 detected 102 0-day bugs and created exploits in Android apps for $1.77
Di Redazione RHC - 06/09/2025

Artificial intelligence systems have been criticized for creating confusing vulnerability reports and inundating open-source developers with irrelevant complaints. But researchers at Nanjing Universit...

Backdoor in xz Utils: 35 Docker Hub images still infected

Analysts at Binarly have found at least 35 images on Docker Hub still infected with a backdoor that penetrated xz Utils last year. Researchers warned ...
Redazione RHC - 14/08/2025 - 09:41

Huawei introduces algorithm that reduces dependence on foreign chips

Huawei has unveiled a new software tool that speeds up large AI models by distributing data more efficiently across different types of memory. This co...
Redazione RHC - 14/08/2025 - 09:17

Did you meet a girl online? Four Ghanaians might have hit on you.

The U.S. Department of Justice has indicted four Ghanaian nationals for their involvement in a massive international fraud ring that stole over $100 m...
Redazione RHC - 14/08/2025 - 07:55

Microsoft Office: Three Critical Vulnerabilities: Update Now

Three serious vulnerabilities in Microsoft Office that could allow attackers to execute remote code on affected systems have been addressed by Microso...
Redazione RHC - 14/08/2025 - 07:42

Self-programming AI: 2025 could mark a turning point for programmers

From learning machines to self-improving ones: the evolutionary leap that is rewriting the code of the future As you read this article, most likel...
Carlo Denza - 14/08/2025 - 07:21

The Sexualisation of AI: A Warning for Humanity

Is AI replacing intimacy? Artificial Intelligence is one of the most powerful technological shifts in human history. It can simulate thought, learn...
Ashleigh Crause - 13/08/2025 - 23:53
1 40 41 42 43 44 137

Backdoor in xz Utils: 35 Docker Hub images still infected

- August 14th, 2025

Analysts at Binarly have found at least 35 images on Docker Hub still infected with a backdoor that penetrated xz Utils last year. Researchers warned that this could potentially put...

  

Huawei introduces algorithm that reduces dependence on foreign chips

- August 14th, 2025

Huawei has unveiled a new software tool that speeds up large AI models by distributing data more efficiently across different types of memory. This could help China reduce its dependence...

  

Did you meet a girl online? Four Ghanaians might have hit on you.

- August 14th, 2025

The U.S. Department of Justice has indicted four Ghanaian nationals for their involvement in a massive international fraud ring that stole over $100 million through romance scams and attacks that...

  

Microsoft Office: Three Critical Vulnerabilities: Update Now

- August 14th, 2025

Three serious vulnerabilities in Microsoft Office that could allow attackers to execute remote code on affected systems have been addressed by Microsoft with the release of crucial security updates. These...

  

Self-programming AI: 2025 could mark a turning point for programmers

- August 14th, 2025

From learning machines to self-improving ones: the evolutionary leap that is rewriting the code of the future As you read this article, most likely, in a data center around the...

  

The Sexualisation of AI: A Warning for Humanity

- August 13th, 2025

Is AI replacing intimacy? Artificial Intelligence is one of the most powerful technological shifts in human history. It can simulate thought, learn from data, and perform intellectual feats in seconds...

  

Sign up for the newsletter