Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320x100 Itcentric
UtiliaCS 970x120

Author: Redazione RHC

Redazione RHC

The Red Hot Cyber Editorial Team provides daily updates on bugs, data breaches, and global threats. Every piece of content is validated by our community of experts, including Pietro Melillo, Massimiliano Brolli, Sandro Sana, Olivia Terragni, and Stefano Gazzella.

Through synergy with our industry-leading partners—such as Accenture, CrowdStrike, Trend Micro, and Fortinet—we transform technical complexity into collective awareness. We ensure information accuracy by analyzing primary sources and maintaining a rigorous technical peer-review process.

Amazon Web Services Cloud Outage, Global Issues

A major outage in Amazon Web Services (AWS) cloud services has caused widespread connection issues around the world, affecting major platforms such as Snapchat, Facebook, and Fortnite , along with...
Share on Facebook Share on LinkedIn Share on X

Google Announces Gemini 3.0: Artificial Intelligence Evolves Toward AGI

At the Dreamforce conference in San Francisco, Google CEO Sundar Pichai announced that Google will release a new version of its artificial intelligence, Gemini 3.0 , later this year. The...
Share on Facebook Share on LinkedIn Share on X

They’re Coming! Unitree Robotics Launches the H2 Destiny Awakening Humanoid

Chinese company Unitree Robotics has challenged the leadership of American robotics with the launch of its H2 "Destiny Awakening" humanoid robot. The robot combines a human form with surprisingly agile...
Share on Facebook Share on LinkedIn Share on X

The Intel 386 processor turns 40: the 32-bit era began

October 20, 2025, marks a significant anniversary in the history of computing: the Intel 80386 processor, also known as the i386 , celebrates its 40th birthday . And it's a...
Share on Facebook Share on LinkedIn Share on X

Lancelot, the secure federated learning system

A team of researchers in Hong Kong has released a system called Lancelot, which represents the first practical implementation of federated learning while also being protected from data tampering attacks...
Share on Facebook Share on LinkedIn Share on X

ChatGPT writes the perfect scam… but the scammer leaves the AI instructions inside.

At first glance, the email seemed flawless. A well-structured PagoPA payment reminder , with formal language, references to the Highway Code and even a blue “Access the PagoPA Portal” button...
Share on Facebook Share on LinkedIn Share on X

Gmail introduces trusted contacts to recover accounts

A new Gmail security feature will allow users to restore access to their accounts with the help of friends or family. Trusted contacts (Recovery Contacts) can be used to obtain...
Share on Facebook Share on LinkedIn Share on X

China accuses US of cyber attack on National Time Service Center

China's Ministry of State Security announced it has discovered "irrefutable evidence" of a cyberattack on the National Time Service Center, the agency responsible for maintaining Beijing's standard time. The agency...
Share on Facebook Share on LinkedIn Share on X

Boris Johnson is enthusiastic about AI: he uses ChatGPT for his books.

Former British Prime Minister Boris Johnson has expressed his enthusiasm for artificial intelligence, revealing in an interview that he uses ChatGPT to write his books. "I love AI. I love...
Share on Facebook Share on LinkedIn Share on X

China challenges Intel: Loongson launches fully independent 3C6000 CPU

Wang Songyu , Deputy General Manager of Loongson Technology 's Business Division, reaffirmed on October 18 the company's strategy of developing fully independent CPUs , in line with China's national...
Share on Facebook Share on LinkedIn Share on X