Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
LECS 320x100 1
Fortinet 970x120px

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

Immagine del sito
Anthropic Releases Claude Opus 4.5: AI Model for Enhanced Productivity
Di Redazione RHC - 24/11/2025

Anthropic has released Claude Opus 4.5 , its new flagship model, which the company says is the most powerful version yet and ranks at the top of the class for practical programming, agent-based produc...

Immagine del sito
Alibaba Qwen3Max Dominates AI Market with Rapid Growth
Di Redazione RHC - 24/11/2025

On November 24, Alibaba announced Qwen3Max, which had been in public beta for a week , and had already surpassed 10 million downloads. It was a record that shattered all others. In a very short time, ...

Immagine del sito
Digital Surveillance at Work: The Rise of Algorithmic Monitoring
Di Redazione RHC - 24/11/2025

Remote work has given employees freedom , but with it has also come digital surveillance . We discussed this some time ago in an article, reporting that these monitoring tools are also coming to Micro...

Immagine del sito
Cyberattack on Eurofiber France: Find out what happened
Di Redazione RHC - 24/11/2025

On November 13, Eurofiber France, a respected provider of fiber optic network and VPN solutions to many of France’s leading companies, discovered that its systems had been compromised by criminal ha...

Online PoC for 7-Zip flaws: Exploit allows arbitrary code execution

A proof-of-concept exploit has been developed for two critical vulnerabilities in the popular 7-Zip archiving software. These vulnerabilities could be...
Redazione RHC - 18/10/2025 - 15:16

Inmates hack prison: sentences reduced, funds transferred, and unauthorized visits

The Romanian penitentiary system has found itself at the center of a major digital scandal: inmates in Târgu Jiu hacked the PNA's internal platform an...
Redazione RHC - 18/10/2025 - 11:58

Using a VPN to watch adult content? It’ll be a crime in Wisconsin.

Wisconsin authorities have decided to go further than most other US states in promoting mandatory age verification for accessing adult content. AB 105...
Redazione RHC - 18/10/2025 - 10:22

Introduction to Convolutional Neural Networks

In the ever-expanding world of artificial intelligence (AI), there is a revolutionary technology that has changed the way machines “see” and “understa...
Simone Raponi - 18/10/2025 - 09:26

Pasquale’s Experience: A Text Message in the Heat – Session 1

Cybercrime is increasingly looming over the unfortunate online world. Fake profiles and scams are rampant on social networks, which, even with the bes...
Massimiliano Brolli - 18/10/2025 - 09:24

Inside IEEE 802.11 Wireless Networks: Wi-Fi Architecture and Signaling

IEEE 802.11 wireless networks, better known as Wi-Fi, are the beating heart of modern connectivity. From a niche solution for home use to a technologi...
Vincenzo Miccoli - 18/10/2025 - 09:20
1 60 61 62 63 64 253

Online PoC for 7-Zip flaws: Exploit allows arbitrary code execution

- October 18th, 2025

A proof-of-concept exploit has been developed for two critical vulnerabilities in the popular 7-Zip archiving software. These vulnerabilities could be exploited by attackers to remotely execute arbitrary code by sending...

Facebook Linkedin X

Inmates hack prison: sentences reduced, funds transferred, and unauthorized visits

- October 18th, 2025

The Romanian penitentiary system has found itself at the center of a major digital scandal: inmates in Târgu Jiu hacked the PNA's internal platform and, for several months, managed data...

Facebook Linkedin X

Using a VPN to watch adult content? It’ll be a crime in Wisconsin.

- October 18th, 2025

Wisconsin authorities have decided to go further than most other US states in promoting mandatory age verification for accessing adult content. AB 105 / SB 130 , first introduced in...

Facebook Linkedin X

Introduction to Convolutional Neural Networks

- October 18th, 2025

In the ever-expanding world of artificial intelligence (AI), there is a revolutionary technology that has changed the way machines “see” and “understand” the world around them: Convolutional Neural Networks (CNNs)....

Facebook Linkedin X

Pasquale’s Experience: A Text Message in the Heat – Session 1

- October 18th, 2025

Cybercrime is increasingly looming over the unfortunate online world. Fake profiles and scams are rampant on social networks, which, even with the best artificial intelligence, struggle to keep up with...

Facebook Linkedin X

Inside IEEE 802.11 Wireless Networks: Wi-Fi Architecture and Signaling

- October 18th, 2025

IEEE 802.11 wireless networks, better known as Wi-Fi, are the beating heart of modern connectivity. From a niche solution for home use to a technological cornerstone for the Internet of...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE