Welcome to Red Hot Cyber | Cybersecurity News
Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
320x100 Itcentric
LECS 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Google Announces Gemini 3.0: Artificial Intelligence Evolves Toward AGI

At the Dreamforce conference in San Francisco, Google CEO Sundar Pichai announced that Google will release a new version of...
Redazione RHC - 20 October 2025

They’re Coming! Unitree Robotics Launches the H2 Destiny Awakening Humanoid

Chinese company Unitree Robotics has challenged the leadership of American robotics with the launch of its H2 "Destiny Awakening" humanoid...
Redazione RHC - 20 October 2025

The Intel 386 processor turns 40: the 32-bit era began

October 20, 2025, marks a significant anniversary in the history of computing: the Intel 80386 processor, also known as the...
Redazione RHC - 20 October 2025

Lancelot, the secure federated learning system

A team of researchers in Hong Kong has released a system called Lancelot, which represents the first practical implementation of...
Redazione RHC - 20 October 2025

FlorentIA: A Look at Artificial Intelligence in the Heart of Florence

At the beginning of this month, Florence hosted a unique event on October 1st: FlorentIA . FlorentIA presents itself as...
Nicola Tarlini - 20 October 2025

ChatGPT writes the perfect scam… but the scammer leaves the AI instructions inside.

At first glance, the email seemed flawless. A well-structured PagoPA payment reminder , with formal language, references to the Highway...
Redazione RHC - 20 October 2025

Google Announces Gemini 3.0: Artificial Intelligence Evolves Toward AGI

At the Dreamforce conference in San Francisco, Google CEO Sundar Pichai announced that Google will release a new version of its artificial intelligence, Gemini 3.0 , later this year. The...
Facebook Linkedin X

They’re Coming! Unitree Robotics Launches the H2 Destiny Awakening Humanoid

Chinese company Unitree Robotics has challenged the leadership of American robotics with the launch of its H2 "Destiny Awakening" humanoid robot. The robot combines a human form with surprisingly agile...
Facebook Linkedin X

The Intel 386 processor turns 40: the 32-bit era began

October 20, 2025, marks a significant anniversary in the history of computing: the Intel 80386 processor, also known as the i386 , celebrates its 40th birthday . And it's a...
Facebook Linkedin X

Lancelot, the secure federated learning system

A team of researchers in Hong Kong has released a system called Lancelot, which represents the first practical implementation of federated learning while also being protected from data tampering attacks...
Facebook Linkedin X

FlorentIA: A Look at Artificial Intelligence in the Heart of Florence

At the beginning of this month, Florence hosted a unique event on October 1st: FlorentIA . FlorentIA presents itself as an unmissable event for understanding Artificial Intelligence and its multiple...
Facebook Linkedin X

ChatGPT writes the perfect scam… but the scammer leaves the AI instructions inside.

At first glance, the email seemed flawless. A well-structured PagoPA payment reminder , with formal language, references to the Highway Code and even a blue “Access the PagoPA Portal” button...
Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sito
Cisco Secure Email Gateway Vulnerability Exploited: Act Now
Redazione RHC - 21/12/2025

A critical zero-day flaw in Cisco Secure Email Gateway and Cisco Secure Email and Web Manager devices is causing concern among security researchers. With over 120 vulnerable devices already identified and actively exploited by attackers,…

Immagine del sito
Airbus Eyes Sovereign Cloud to Mitigate US Data Risks
Redazione RHC - 21/12/2025

In recent months, a question has been emerging with increasing insistence on European corporate boards: is the US cloud really safe for all companies? Especially for those operating in strategic sectors or with economic, industrial,…

Immagine del sito
North Korean Hackers Steal $2 Billion in Crypto, Targeting DeFi Sector
Redazione RHC - 21/12/2025

In 2025, North Korean hackers stole a record $2 billion in cryptocurrency , 51% more than the previous year. However, the number of attacks has decreased, while the damage has increased. According to Chainalysis, North…

Immagine del sito
Kimwolf Botnet: The Rising Threat of DDoS Attacks on IoT Devices
Redazione RHC - 20/12/2025

A new and formidable enemy has emerged in the cyber threat landscape: Kimwolf, a fearsome DDoS botnet, is having a devastating impact on devices worldwide. The consequences of this threat can be extremely serious, and…

Immagine del sito
54 Arrested in $Multi-Million ATM Jackpotting Scheme Linked to Tren de Aragua
Redazione RHC - 20/12/2025

A federal grand jury in the District of Nebraska has indicted a total of 54 people accused of participating in a vast criminal operation that used malware to steal millions of dollars from U.S. ATMs.…