Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
LECS 320x100 1
Redhotcyber Banner Sito 970x120px Uscita 101125

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

Discovering Prompt Injection: When AI Gets Fooled by Words

Generative Artificial Intelligence (GenAI) systems are revolutionizing the way we interact with technology, offering extraordinary capabilities in the...
Manuel Roccon - 02/10/2025 - 07:58

Can a camera read your mind? The answer comes from Portugal.

A study conducted at the Champalimode Foundation in Portugal has shown that a simple video recording is enough to "peek" into the thought process. Sci...
Redazione RHC - 02/10/2025 - 07:36

Microsoft challenges Nvidia and AMD with its proprietary chips for artificial intelligence.

Microsoft is accelerating the in-house production of semiconductors for its data centers, aiming to reduce its dependence on external suppliers like N...
Redazione RHC - 02/10/2025 - 07:17

China mandates AI content labels. Let’s see what’s happening.

Starting September 1, 2025, all artificial intelligence (AI)-generated content in China must be marked with an "electronic watermark," according to ne...
Redazione RHC - 02/10/2025 - 07:07

MatrixPDF arrives: just a few clicks and phishing is served!

A new phishing toolkit, MatrixPDF , has been discovered that allows attackers to transform ordinary PDF files into interactive decoys that bypass emai...
Redazione RHC - 01/10/2025 - 20:58

A critical bug in VMware Aria Operations and VMware Tools has been exploited by Chinese hackers for months.

Broadcom has fixed a severe privilege escalation vulnerability in VMware Aria Operations and VMware Tools that was exploited in attacks starting in Oc...
Redazione RHC - 01/10/2025 - 15:56
1 86 87 88 89 90 256

Discovering Prompt Injection: When AI Gets Fooled by Words

- October 1st, 2025

Generative Artificial Intelligence (GenAI) systems are revolutionizing the way we interact with technology, offering extraordinary capabilities in the creation of text, images, and code. However, this innovation brings with it...

Facebook Linkedin X

Can a camera read your mind? The answer comes from Portugal.

- October 1st, 2025

A study conducted at the Champalimode Foundation in Portugal has shown that a simple video recording is enough to "peek" into the thought process. Scientists discovered that mice's facial expressions...

Facebook Linkedin X

Microsoft challenges Nvidia and AMD with its proprietary chips for artificial intelligence.

- October 1st, 2025

Microsoft is accelerating the in-house production of semiconductors for its data centers, aiming to reduce its dependence on external suppliers like Nvidia and AMD. Kevin Scott, the tech giant's Chief...

Facebook Linkedin X

China mandates AI content labels. Let’s see what’s happening.

- October 1st, 2025

Starting September 1, 2025, all artificial intelligence (AI)-generated content in China must be marked with an "electronic watermark," according to new legislation. The stated goal is to improve the transparency...

Facebook Linkedin X

MatrixPDF arrives: just a few clicks and phishing is served!

- September 30th, 2025

A new phishing toolkit, MatrixPDF , has been discovered that allows attackers to transform ordinary PDF files into interactive decoys that bypass email security and redirect victims to websites that...

Facebook Linkedin X

A critical bug in VMware Aria Operations and VMware Tools has been exploited by Chinese hackers for months.

- September 30th, 2025

Broadcom has fixed a severe privilege escalation vulnerability in VMware Aria Operations and VMware Tools that was exploited in attacks starting in October 2024. The issue has been assigned the...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE