Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Enterprise BusinessLog 320x200 1
UtiliaCS 970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

Immagine del sito
Anthropic Releases Claude Opus 4.5: AI Model for Enhanced Productivity
Di Redazione RHC - 24/11/2025

Anthropic has released Claude Opus 4.5 , its new flagship model, which the company says is the most powerful version yet and ranks at the top of the class for practical programming, agent-based produc...

Immagine del sito
Alibaba Qwen3Max Dominates AI Market with Rapid Growth
Di Redazione RHC - 24/11/2025

On November 24, Alibaba announced Qwen3Max, which had been in public beta for a week , and had already surpassed 10 million downloads. It was a record that shattered all others. In a very short time, ...

Immagine del sito
Digital Surveillance at Work: The Rise of Algorithmic Monitoring
Di Redazione RHC - 24/11/2025

Remote work has given employees freedom , but with it has also come digital surveillance . We discussed this some time ago in an article, reporting that these monitoring tools are also coming to Micro...

Immagine del sito
Cyberattack on Eurofiber France: Find out what happened
Di Redazione RHC - 24/11/2025

On November 13, Eurofiber France, a respected provider of fiber optic network and VPN solutions to many of France’s leading companies, discovered that its systems had been compromised by criminal ha...

DAS: The world’s ear hidden in submarine cables

Over 1.2 million kilometers of fiber optic cables lie on the ocean floor, long considered solely part of a global telecommunications network. However,...
Redazione RHC - 13/10/2025 - 07:12

Hacker culture pioneer Peter Samson plays “Boards of Canada” on PDP-1

In a world where music has long since migrated to streaming and digital platforms, one enthusiast decided to go back six decades, to a time when melod...
Redazione RHC - 12/10/2025 - 21:17

Crimson Collective claims alleged Nintendo hack: bluff or real breach?

This time, hackers are targeting Nintendo , the historic Japanese video game company that has been tooth and nail for decades defending its intellectu...
Luca Galuppi - 12/10/2025 - 18:34

Critical vulnerabilities in Microsoft Defender for Endpoint: security risks

Security flaws have been discovered in network communication between Microsoft Defender for Endpoint (DFE) cloud services , allowing attackers, follow...
Redazione RHC - 12/10/2025 - 17:49

Between AI and fear, Skynet teaches: “We’ll build bunkers before launching AGI.”

The quote, “We’ll definitely build a bunker before we launch AGI,” that inspired the article, was attributed to a Silicon Valley leader, though it’s u...
Redazione RHC - 12/10/2025 - 09:06

GitHub is migrating to Azure! And goodbye to new development for a year.

When Microsoft acquired GitHub in 2018, the company tried to stay away. The platform developed relatively independently until things began to change i...
Redazione RHC - 12/10/2025 - 08:24
1 70 71 72 73 74 254

DAS: The world’s ear hidden in submarine cables

- October 13th, 2025

Over 1.2 million kilometers of fiber optic cables lie on the ocean floor, long considered solely part of a global telecommunications network. However, distributed acoustic sensing (DAS) technology , rapidly...

Facebook Linkedin X

Hacker culture pioneer Peter Samson plays “Boards of Canada” on PDP-1

- October 12th, 2025

In a world where music has long since migrated to streaming and digital platforms, one enthusiast decided to go back six decades, to a time when melodies could still come...

Facebook Linkedin X

Crimson Collective claims alleged Nintendo hack: bluff or real breach?

- October 12th, 2025

This time, hackers are targeting Nintendo , the historic Japanese video game company that has been tooth and nail for decades defending its intellectual property and the industrial secrets that...

Facebook Linkedin X

Critical vulnerabilities in Microsoft Defender for Endpoint: security risks

- October 12th, 2025

Security flaws have been discovered in network communication between Microsoft Defender for Endpoint (DFE) cloud services , allowing attackers, following a breach, to bypass authentication, manipulate data, release sensitive information,...

Facebook Linkedin X

Between AI and fear, Skynet teaches: “We’ll build bunkers before launching AGI.”

- October 12th, 2025

The quote, “We’ll definitely build a bunker before we launch AGI,” that inspired the article, was attributed to a Silicon Valley leader, though it’s unclear who exactly he meant by...

Facebook Linkedin X

GitHub is migrating to Azure! And goodbye to new development for a year.

- October 12th, 2025

When Microsoft acquired GitHub in 2018, the company tried to stay away. The platform developed relatively independently until things began to change in recent months. The departure of GitHub CEO...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE