Welcome to Red Hot Cyber | Cybersecurity News
Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Redhotcyber Banner Sito 320x100px Uscita 101125
LECS 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

The DGX Spark is on sale. An AI supercomputer in the palm of your hand!

We talked about the DGX Spark on August 29th , but now it seems that NVIDIA has released it and...
Redazione RHC - 16 October 2025

The Poison of Curiosity and the Antidote of Cyber Hygiene: A Social Engineering Recipe

Curiosity, that old rascal. It's the kind of thing that's been making people click links or open attachments in a...
Stefano Gazzella - 16 October 2025

LatentBreak: A New Attack Method for Language Models

A group of scientists has developed a new way to attack large language models : a method called LatentBreak ....
Redazione RHC - 16 October 2025

Alert: Thousands of Italian websites at risk! 526,000 sites and 6,500 databases for sale on the Darkweb

A new post on the dark web offers full access to thousands of MySQL servers and databases owned by Italian...
Luca Stivali - 16 October 2025

F5 Suffers Security Breach: Source Code and Sensitive Data Stolen

A serious security incident has been reported by F5, a leading provider of application security and delivery solutions. A complex...
Redazione RHC - 16 October 2025

Software Update Renders Jeep 4xe Vehicles Unusable

A software update released last weekend for Jeep 4xe hybrid models caused a serious malfunction: the vehicles stopped working, leaving...
Redazione RHC - 16 October 2025

From Commodore 64 to GitHub! Gates and Allen’s BASIC goes open source after 48 years.

Microsoft has officially released the source code for its first version of BASIC for the MOS 6502 processor. For decades, it existed only in the form of leaks, museum copies,...
Share on Facebook Share on LinkedIn Share on X

New Wave of Quishing Attacks: Innovative Tactics from Cybercriminals

In recent years, a particularly insidious form of phishing has become widespread: Quishing or QRishing, a strategy based on the use of QR codes containing malicious links that, once scanned,...
Share on Facebook Share on LinkedIn Share on X

Netshacker: Retrogaming e Hacking Reale su Commodore 64

In the Commodore 64 gaming landscape, Netshacker stands out as a project that challenges the conventions of modern gaming, taking gamers back to the roots of 1980s home computing. This...
Share on Facebook Share on LinkedIn Share on X

NotDoor Arrives: APT28’s Microsoft Outlook Backdoor

An advanced backdoor system associated with the notorious Russian cyberespionage group APT28 allows attackers to download data, upload files, and issue commands to infected PCs. This recently discovered, next-generation backdoor...
Share on Facebook Share on LinkedIn Share on X

Trump meets with all the AI tech leaders at the White House. Elon Musk is notably absent!

Today, Thursday, September 4, 2025, US President Donald Trump will host over two dozen technology and business leaders for a dinner in the newly renovated White House Rose Garden. An...
Share on Facebook Share on LinkedIn Share on X

Red Hot Cyber Conference 2026: Sponsorships Open for the Fifth Edition in Rome

The Red Hot Cyber Conference has become a regular event for the Red Hot Cyber community and for anyone working in or interested in the world of digital technologies and...
Share on Facebook Share on LinkedIn Share on X

Hexstrike AI unleashes chaos! Zero-days exploited in record time

The release of Hexstrike-AI marks a turning point in the cybersecurity landscape. The framework, billed as a next-generation tool for red teams and researchers, is capable of orchestrating over 150...
Share on Facebook Share on LinkedIn Share on X

Microsoft Introduces POML for Orchestrating LLM Prompts

Microsoft today introduced POML (Prompt Orchestration Markup Language), a new markup language for prompt orchestration and specifically designed to enable rapid and structured prototyping of large language models (LLMs). POML...
Share on Facebook Share on LinkedIn Share on X

CISO vs. DPO: Collaboration or Cold War in Business?

Managing security is far from simple, it's not something that can be standardized, and above all, it can't be achieved through "solutions." It requires planning, analysis, and the ability to...
Share on Facebook Share on LinkedIn Share on X

Revolutionize security models with the Unified SASE framework

A unified and secure approach to support digital transformation, enable hybrid working, and reduce operational complexity. By Federico Saraò, Specialized System Engineer SASE, Fortinet Italy The nature of a company's...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sito
DIG AI: The Dark Web’s New AI Tool for Cybercrime
Redazione RHC - 21/12/2025

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…

Immagine del sito
Airbus Eyes Sovereign Cloud to Mitigate US Data Risks
Redazione RHC - 21/12/2025

In recent months, a question has been emerging with increasing insistence on European corporate boards: is the US cloud really safe for all companies? Especially for those operating in strategic sectors or with economic, industrial,…

Immagine del sito
North Korean Hackers Steal $2 Billion in Crypto, Targeting DeFi Sector
Redazione RHC - 21/12/2025

In 2025, North Korean hackers stole a record $2 billion in cryptocurrency , 51% more than the previous year. However, the number of attacks has decreased, while the damage has increased. According to Chainalysis, North…

Immagine del sito
Linux Kernel CVE-2025-68260 Vulnerability Fixed: Rust Code at Risk
Redazione RHC - 19/12/2025

The world of technology is a veritable battlefield, where coding geniuses challenge malicious attackers every day with exploits and security patches. That’s why the recent discovery of a vulnerability in the Linux kernel has caused…

Immagine del sito
HPE OneView Vulnerability CVE-2025-37164: Critical Security Update Required
Redazione RHC - 18/12/2025

Cybersecurity is a serious issue, especially when it comes to vulnerabilities that can compromise an entire system. Well, Hewlett Packard Enterprise (HPE) has just raised the alarm about a truly worrying security flaw in its…