Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

- June 27th, 2025 - (Posted in Cybercrime and Darknet)
An unusual example of malicious code has been discovered in a real computing environment, which for the first time recorded an attempt to attack not classical defense mechanisms, but directly artificial intelligence systems. We are talking about the prompt injection technique, i.e. the introduction of hidden instructions capable of compromising...

Juniper Networks Releases Security Updates for a Critical 10.0 Vulnerability

- July 1st, 2024

Juniper Networks has recently announced the release of out-of-band security updates to address a severe vulnerability that could lead to an authentication bypass in some of its routers. This vulnerability,...

  

Allegedly Data Breach: Kemenkumham Email Credentials Compromised

- July 1st, 2024

A significant data breach has involved the Ministry of Law and Human Rights (Kemenkumham) in Indonesia. According to a post on a hacker forum, a threat actor under the pseudonym...

  

Coinbase USA: Threat Actor Claims to Sell Database of 600,000 Users

- July 1st, 2024

In the past few hours, a new and alarming cyber threat has emerged. A threat actor has claimed to possess and intends to sell a database containing information on 600,000...

  

A Brief History of Artificial Intelligence: From Alan Turing to Generative AI

- June 30th, 2024

Artificial Intelligence (AI) is in the Spotlight Today, Generating Unprecedented Interest and Debate. However, it's important to recognize that this revolutionary technology has a rich history spanning over seventy years...

  

Sign up for the newsletter