Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Fortinet 320x100px
970x20 Itcentric

Author: Redazione RHC

Redazione RHC

The Red Hot Cyber Editorial Team provides daily updates on bugs, data breaches, and global threats. Every piece of content is validated by our community of experts, including Pietro Melillo, Massimiliano Brolli, Sandro Sana, Olivia Terragni, and Stefano Gazzella.

Through synergy with our industry-leading partners—such as Accenture, CrowdStrike, Trend Micro, and Fortinet—we transform technical complexity into collective awareness. We ensure information accuracy by analyzing primary sources and maintaining a rigorous technical peer-review process.

Numero di articoli trovati: 908

Autonomous Warfare: China Unveils Smart Tanks That Fight Alone

The People's Liberation Army (PLA) has announced a shift in ground forces tactics, from traditional close-quarters tank combat to long-range, beyond-line-of-sight operations. This shift was made possible by the introduction...

A new phishing campaign on NPM involves 175 malicious packages.

Attackers are abusing the legitimate npm infrastructure in a new phishing campaign on Beamglea. This time, the malicious packages don't execute malicious code, but instead exploit the legitimate CDN service...

Microsoft warns about uncontrolled use of ‘shadow’ AI in the workplace

While Microsoft actively promotes its Copilot tools for businesses, the company also warns of the dangers of uncontrolled use of "shadow" AI by employees. A new report raises the alarm...

Satellites targeted! Thousands of phone conversations and text messages intercepted.

Satellite communications links used by government agencies, the military, businesses, and mobile operators have been discovered to be the source of a massive data leak. Researchers at the University of...

Nanochat: Create your own LLM, train it, and get it running on your PC for $100

Developer Andrej Karpathy has unveiled nanochat , a minimalist, fully open-source version of ChatGPT that can be trained and run on a single computer. Designed as a learning platform for...

WhatsApp Web in the crosshairs! How the worm that distributes the banking Trojan works

Sophos analysts have discovered a complex malware operation by security experts that uses the popular messaging service WhatsApp to spread banking Trojans, targeting Brazilian banks and cryptocurrency exchanges. A self-replicating...

Poisoned AI! 250 Malicious Documents Are Enough to Compromise an LLM

Researchers at Anthropic, in collaboration with the UK government's AI Safety Institute, the Alan Turing Institute, and other academic institutions, reported that just 250 specially crafted malicious documents were enough...

Spyware yes, spyware no: it’s just a prospect! NSO Group is now under US control.

Israeli company NSO Group, developer of the infamous Pegasus spyware , recently came under the control of American investors. A company spokesperson announced that the new funding amounts to tens...

The AI bubble: fears of a new technological meltdown grow

At DevDay, OpenAI's annual conference this week, CEO Sam Altman took questions from reporters, an increasingly rare occurrence among tech leaders. Altman acknowledged the uncertainty surrounding the AI industry today,...

Hacker culture pioneer Peter Samson plays “Boards of Canada” on PDP-1

In a world where music has long since migrated to streaming and digital platforms, one enthusiast decided to go back six decades, to a time when melodies could still come...