Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Enterprise BusinessLog 320x200 1
970x20 Itcentric

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
ChatGPT to Introduce Targeted Ads, Changing Monetization Strategy
Di Redazione RHC - 29/11/2025

Until now, ChatGPT has been ad-free: no banners, no hidden promotions. Even the paid versions worked without pushy offers. But that could change soon. As reported by user X (formerly of Twitter) under...

Immagine del sito
WhatsApp Blocked in Russia: Messaging App Faces Crackdown
Di Redazione RHC - 28/11/2025

The Russian Federation’s Roskomnadzor has announced that it continues to impose systematic restrictions on the messaging app WhatsApp due to violations of Russian law. According to the agency, the s...

Immagine del sito
Shai-Hulud Worm Spreads Beyond npm, Attacks Maven
Di Redazione RHC - 28/11/2025

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Immagine del sito
11.7% of jobs could be replaced by artificial intelligence
Di Redazione RHC - 28/11/2025

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

When the Cloud Falls: How a Small Mistake Brought the Global Internet to Its Knees

This fall, we've had quite a bit of a cloud headache, I don't know if you've noticed. That is, AWS, Azure , and then Cloudflare . All of them down, on...
Gaia Russo - 24/11/2025 - 07:23

Father and son break world speed record with homemade drone

This summer, in the Dubai desert, a flight occurred that few expected to see from a battery-powered quadcopter. The experimental Peregreen 3 reached a...
Redazione RHC - 23/11/2025 - 13:41

Microsoft Blocks KMS38 Activation Method for Windows 10 and 11

Users noticed that last week Microsoft developers disabled the offline activation method for Windows 11 and 10 via KMS38, which has been used by hacke...
Redazione RHC - 23/11/2025 - 13:39

Future prospects for computer science and technology graduates

Artificial intelligence is changing the way recent computer science graduates approach the world of work. It's not about sudden job disappearances , b...
Redazione RHC - 23/11/2025 - 10:15

ATMs targeted! Cybersecurity experts reveal an attack campaign targeting ATMs.

Group-IB experts presented a detailed analysis of the long-running UNC2891 campaign, which demonstrated the continuing sophistication of ATM attack sc...
Redazione RHC - 23/11/2025 - 09:38

Google Gemini Improves AI-Generated Image Verification

Google has expanded the capabilities of its Gemini artificial intelligence service by adding a tool to the app and web version to check images for sig...
Redazione RHC - 23/11/2025 - 09:37
1 6 7 8 9 10 258

When the Cloud Falls: How a Small Mistake Brought the Global Internet to Its Knees

- November 23rd, 2025

This fall, we've had quite a bit of a cloud headache, I don't know if you've noticed. That is, AWS, Azure , and then Cloudflare . All of them down,...

Facebook Linkedin X

Father and son break world speed record with homemade drone

- November 22nd, 2025

This summer, in the Dubai desert, a flight occurred that few expected to see from a battery-powered quadcopter. The experimental Peregreen 3 reached a speed of 360.4 miles per hour...

Facebook Linkedin X

Microsoft Blocks KMS38 Activation Method for Windows 10 and 11

- November 22nd, 2025

Users noticed that last week Microsoft developers disabled the offline activation method for Windows 11 and 10 via KMS38, which has been used by hackers around the world for years....

Facebook Linkedin X

Future prospects for computer science and technology graduates

- November 22nd, 2025

Artificial intelligence is changing the way recent computer science graduates approach the world of work. It's not about sudden job disappearances , but rather a transformation of entry-level roles in...

Facebook Linkedin X

ATMs targeted! Cybersecurity experts reveal an attack campaign targeting ATMs.

- November 22nd, 2025

Group-IB experts presented a detailed analysis of the long-running UNC2891 campaign, which demonstrated the continuing sophistication of ATM attack schemes. Attention focused on the Raspberry Pi, which the attackers used...

Facebook Linkedin X

Google Gemini Improves AI-Generated Image Verification

- November 22nd, 2025

Google has expanded the capabilities of its Gemini artificial intelligence service by adding a tool to the app and web version to check images for signs of automatic generation ....

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE