Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Mobile
Banner Ransomfeed 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

Immagine del sito
Anthropic Releases Claude Opus 4.5: AI Model for Enhanced Productivity
Di Redazione RHC - 24/11/2025

Anthropic has released Claude Opus 4.5 , its new flagship model, which the company says is the most powerful version yet and ranks at the top of the class for practical programming, agent-based produc...

Immagine del sito
Alibaba Qwen3Max Dominates AI Market with Rapid Growth
Di Redazione RHC - 24/11/2025

On November 24, Alibaba announced Qwen3Max, which had been in public beta for a week , and had already surpassed 10 million downloads. It was a record that shattered all others. In a very short time, ...

Immagine del sito
Digital Surveillance at Work: The Rise of Algorithmic Monitoring
Di Redazione RHC - 24/11/2025

Remote work has given employees freedom , but with it has also come digital surveillance . We discussed this some time ago in an article, reporting that these monitoring tools are also coming to Micro...

Immagine del sito
Cyberattack on Eurofiber France: Find out what happened
Di Redazione RHC - 24/11/2025

On November 13, Eurofiber France, a respected provider of fiber optic network and VPN solutions to many of France’s leading companies, discovered that its systems had been compromised by criminal ha...

Poisoned AI! 250 Malicious Documents Are Enough to Compromise an LLM

Researchers at Anthropic, in collaboration with the UK government's AI Safety Institute, the Alan Turing Institute, and other academic institutions, r...
Redazione RHC - 13/10/2025 - 15:10

Spyware yes, spyware no: it’s just a prospect! NSO Group is now under US control.

Israeli company NSO Group, developer of the infamous Pegasus spyware , recently came under the control of American investors. A company spokesperson a...
Redazione RHC - 13/10/2025 - 14:28

Electricians and plumbers: They are the real winners of the AI boom

Jensen Huang, CEO of NVIDIA, has openly stated that the real winners in the AI boom, at least in the short to medium term, will be electricians, plumb...
Sandro Sana - 13/10/2025 - 11:03

Towards “legal technology”: legal education in the digital age must be technological.

As a criminal lawyer and professor of Criminal Computer Law, a student of the late Vittorio Frosini, a pioneer of legal informatics in Italy, I consta...
Paolo Galdieri - 13/10/2025 - 09:27

ProxyCommand: The Little String That Opens a Port for Exploits

Yesterday, a vulnerability in OpenSSH, CVE-2025-61984, was published that potentially allows command execution on the client when ProxyCommand is used...
Antonio Piazzolla - 13/10/2025 - 08:04

The AI bubble: fears of a new technological meltdown grow

At DevDay, OpenAI's annual conference this week, CEO Sam Altman took questions from reporters, an increasingly rare occurrence among tech leaders. Alt...
Redazione RHC - 13/10/2025 - 07:39
1 69 70 71 72 73 254

Poisoned AI! 250 Malicious Documents Are Enough to Compromise an LLM

- October 13th, 2025

Researchers at Anthropic, in collaboration with the UK government's AI Safety Institute, the Alan Turing Institute, and other academic institutions, reported that just 250 specially crafted malicious documents were enough...

Facebook Linkedin X

Spyware yes, spyware no: it’s just a prospect! NSO Group is now under US control.

- October 13th, 2025

Israeli company NSO Group, developer of the infamous Pegasus spyware , recently came under the control of American investors. A company spokesperson announced that the new funding amounts to tens...

Facebook Linkedin X

Electricians and plumbers: They are the real winners of the AI boom

- October 13th, 2025

Jensen Huang, CEO of NVIDIA, has openly stated that the real winners in the AI boom, at least in the short to medium term, will be electricians, plumbers, and skilled...

Facebook Linkedin X

Towards “legal technology”: legal education in the digital age must be technological.

- October 13th, 2025

As a criminal lawyer and professor of Criminal Computer Law, a student of the late Vittorio Frosini, a pioneer of legal informatics in Italy, I constantly reflect on the state...

Facebook Linkedin X

ProxyCommand: The Little String That Opens a Port for Exploits

- October 13th, 2025

Yesterday, a vulnerability in OpenSSH, CVE-2025-61984, was published that potentially allows command execution on the client when ProxyCommand is used with usernames containing control characters (e.g., newlines). Some OpenSSH input...

Facebook Linkedin X

The AI bubble: fears of a new technological meltdown grow

- October 13th, 2025

At DevDay, OpenAI's annual conference this week, CEO Sam Altman took questions from reporters, an increasingly rare occurrence among tech leaders. Altman acknowledged the uncertainty surrounding the AI industry today,...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE