Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Mobile V1
970x20 Itcentric

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
AI Alignment: Where Does AI Learn Right and Wrong?
Di Sergio Corpettini - 14/10/2025

The other day on LinkedIn, I found myself having a conversation with someone who was seriously interested in the topic of artificial intelligence applied to law. It wasn’t one of those barroom c...

Immagine del sito
Microsoft Patch Tuesday: 175 vulnerabilities fixed and two zero-days exploited
Di Redazione RHC - 14/10/2025

In its latest update, the tech giant fixed 175 vulnerabilities affecting its core products and underlying systems, including two actively exploited zero-day vulnerabilities , the company said in its l...

Immagine del sito
12 security bugs discovered in Ivanti Endpoint Manager (EPM). Update now!
Di Redazione RHC - 14/10/2025

Ivanti has published 13 vulnerabilities in its Endpoint Manager (EPM) software , including two high-severity flaws that could allow remote code execution and privilege escalation . Despite the lack of...

Immagine del sito
WhatsApp Web in the crosshairs! How the worm that distributes the banking Trojan works
Di Redazione RHC - 14/10/2025

Sophos analysts have discovered a complex malware operation by security experts that uses the popular messaging service WhatsApp to spread banking Trojans, targeting Brazilian banks and cryptocurrency...

Immagine del sito
RMPocalypse: A critical bug in AMD SEV-SNP threatens cloud security.
Di Redazione RHC - 13/10/2025

A critical vulnerability has been identified in the AMD SEV-SNP hardware security architecture, impacting major cloud providers (AWS, Microsoft Azure, and Google Cloud) . This flaw allows malicious hy...

Security alert for AI servers: thousands are at risk

Artificial intelligence systems are increasingly under attack. This data emerges from "Trend Micro State of AI Security Report, 1H 2025". The company ...
Redazione RHC - 16/09/2025 - 11:24

DeliveryRAT Trojan Alert: Hackers Steal Data and Money with Fake Apps

F6 and RuStore experts report having discovered and blocked 604 domains that were part of the infrastructure of hackers who infected mobile devices wi...
Redazione RHC - 16/09/2025 - 10:36

Plato, the cave, and social media: are we only looking at shadows?

The famous Socratic precept "Know thyself" has never been more relevant. Today, our digital identity is a fragmented mosaic of social profiles, search...
Daniela Farina - 16/09/2025 - 08:51

Vibe coding, yes, but be careful. Speed doesn’t always beat quality.

There's a new phenomenon in the programming industry: vibe coding. Developers are increasingly using artificial intelligence agents to speed up their ...
Redazione RHC - 16/09/2025 - 07:38

The Great Firewall in the Spotlight: The Leak Revealing the Industrialization of Chinese Censorship

Edited by Luca Stivali and Olivia Terragni. On September 11, 2025, what can be defined as the largest leak ever suffered by the Great Firewall of C...
Redazione RHC - 16/09/2025 - 07:21

Jaguar Land Rover cyberattack leaves $50 million in losses

The cyber attack on Jaguar Land Rover, which paralyzed the company's operations, has become one of the most serious crises for the British car manufac...
Redazione RHC - 16/09/2025 - 07:08
1 43 44 45 46 47 188

Security alert for AI servers: thousands are at risk

- September 16th, 2025

Artificial intelligence systems are increasingly under attack. This data emerges from "Trend Micro State of AI Security Report, 1H 2025". The company urges IT professionals and community leaders to follow...

Facebook Linkedin X

DeliveryRAT Trojan Alert: Hackers Steal Data and Money with Fake Apps

- September 16th, 2025

F6 and RuStore experts report having discovered and blocked 604 domains that were part of the infrastructure of hackers who infected mobile devices with the DeliveryRAT Trojan. The malware masqueraded...

Facebook Linkedin X

Plato, the cave, and social media: are we only looking at shadows?

- September 16th, 2025

The famous Socratic precept "Know thyself" has never been more relevant. Today, our digital identity is a fragmented mosaic of social profiles, search histories, and online interactions, constantly exposed and...

Facebook Linkedin X

Vibe coding, yes, but be careful. Speed doesn’t always beat quality.

- September 16th, 2025

There's a new phenomenon in the programming industry: vibe coding. Developers are increasingly using artificial intelligence agents to speed up their work, but they're also encountering unpredictable problems. The stories...

Facebook Linkedin X

The Great Firewall in the Spotlight: The Leak Revealing the Industrialization of Chinese Censorship

- September 16th, 2025

Edited by Luca Stivali and Olivia Terragni. On September 11, 2025, what can be defined as the largest leak ever suffered by the Great Firewall of China (GFW) exploded in...

Facebook Linkedin X

Jaguar Land Rover cyberattack leaves $50 million in losses

- September 16th, 2025

The cyber attack on Jaguar Land Rover, which paralyzed the company's operations, has become one of the most serious crises for the British car manufacturer. The company was forced to...

Facebook Linkedin X
Most Read Articles of the Month Most Read Articles of the Week
  1. The Truth About Windows XP License Key: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8
  2. Computer science graduates with no future! Thousands of resumes ignored, and goodbye to six-figure salaries.
  3. With 50 dollars and physical access to the server, the Cloud goes to hell
  4. Shocking collapse: -71% of job offers for software engineers in three years
  5. Hackers hit the United States: critical federal infrastructure compromised
  1. The Truth About Windows XP License Key: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8
  2. Microsoft 365 Outage: Thousands of Users Affected Worldwide
  3. Is your VPN protecting you or spying on you? 800 free VPNs analyzed with disturbing results.
  4. GitHub is migrating to Azure! And goodbye to new development for a year.
  5. Hacker culture pioneer Peter Samson plays “Boards of Canada” on PDP-1

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE