Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

- June 27th, 2025 - (Posted in Cybercrime and Darknet)
An unusual example of malicious code has been discovered in a real computing environment, which for the first time recorded an attempt to attack not classical defense mechanisms, but directly artificial intelligence systems. We are talking about the prompt injection technique, i.e. the introduction of hidden instructions capable of compromising...
Cybercrime and Darknet

Connected and Vulnerable: How to Secure OT and ICS in 2025

In today’s interconnected world, cybersecurity is not just about protecting information. Today, most devices and physical tools are connected to the network in some way. Whether for its structural operation or for remote maintenance or monitoring activities, all the tools

News

Urobot watches you while you pee (but it’s for your own good)

A Taiwanese hospital is testing Urobot, a smart urinal that instantly analyzes urine and emails the results. Although the device is designed in a “cute” style, social media users have noted that it looks scary and causes discomfort to patients.

Cybercrime and Darknet

Smart TV or Living Room Spies? Here’s How They’re Monitoring You

Many owners of smart TV operating systems are increasingly finding themselves caught in a conflict that rages between the desire to preserve viewer privacy and pressure from the advertising industry. The point is that TV manufacturers and embedded software developers

$200 for Access to an Italian Company! While the Dark Web is doing business, are you ready to defend yourself?

- June 24th, 2025

Following the case of the 568 endpoints of an Italian industrial machinery company, another compromised access related to an Italian software engineering company has ended up for sale on an underground forum...

  

“Cleaning Up” Windows Update! Microsoft Declares War on Drivers Exploited in Ransomware Attacks

- June 24th, 2025

Microsoft announced that it will periodically remove outdated drivers from the Windows Update Catalog to reduce risk and improve compatibility. "The goal of this initiative is to provide the best set of...

  

Cyberspazio: il filo invisibile tra guerra e pace

Cyberspace: The Invisible Thread Between War and Peace

- June 23rd, 2025

How Iran-Israel’s Digital War Redefines Security, Diplomacy, and the Global Future? Since June 12, a 700% increase in cyber activity has been detected, resulting in a wave of DDoS attacks,...

  

Kill Switch! Donald Trump’s Digital Weapon Threatening Europe

- June 23rd, 2025

Donald Trump's return to the White House has becomea painful reminder for Europe of its main digital vulnerability: the "kill switch" effectively controlled by the United States. Political risks that...

  

Sign up for the newsletter