Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Crowdstrike 320×100
LECS 970x120 1

Author: Redazione RHC

The era of one-handed supercomputers is upon us! GIGABYTE ATOM: A petaflop and 128GB of AI storage.

On October 15, in addition to the much-vaunted NVIDIA DGX Spark solution, created in collaboration between NVIDIA and Mediatek, another mini AI accelerator made its debut to the world: the GIGABYTE ATOM. GIGABYTE Technology, today announced the official launch of its AI TOP ATOM , a platform based on the NVIDIA Grace Blackwell GB10 superchip, the same chip as the DGX Spark. This innovative solution features a lightweight design compatible with standard home power supplies and comes pre-installed with the NVIDIA AI software stack, delivering powerful compute performance, making it an ideal platform for AI prototyping, tuning, and inference. The AI TOP

100 years of Italian Intelligence! Mattarella celebrates the SIM’s centenary at the Quirinale Palace

October 15, 2025 marks an anniversary of exceptional importance in the history of Italian national security: one hundred years since the birth of the Military Information Service (SIM) , the country’s first intelligence service, established in 1925 by royal decree. The SIM was created with the aim of unifying the intelligence structures of the Army, Navy, and Air Force, laying the foundations for a coordinated system for safeguarding state security. Since then, Italian intelligence has undergone a century of profound transformations, moving from its military origins in the post-war period to the current Information System for the Security of the Republic ,

In China, robots do the cleaning: the new frontier of domestic robots

A robot capable of performing complex household tasks was unveiled at the headquarters of Hefei Zero Square Robot Co., Ltd. , marking a new step in the development of embodied intelligence. Inside the company’s exhibition hall, visitors could observe robots equipped with rotating arms performing everyday tasks such as cleaning tables, watering plants, and folding clothes . These demonstrations highlighted the high level of precision and coordination achieved by the control systems and manipulation mechanisms. Hefei Zero Square Robot Co., Ltd. specializes in the research, development, and application of intelligent humanoid robots . The founding team comes from the Intelligent Robotics Laboratory

The DGX Spark is on sale. An AI supercomputer in the palm of your hand!

We talked about the DGX Spark on August 29th , but now it seems that NVIDIA has released it and it has already sold out. The AI revolution has arrived, and now it’s in the palm of your hand. The NVIDIA DGX Spark, based on the NVIDIA GB10 Grace Blackwell superchip, went on sale on October 15th. This revolutionary personal AI supercomputer enables developers to prototype, refine, and infer large-scale AI models on the desktop. The GB10 leverages MediaTek’s expertise in designing high-performance, low-power, high-speed CPUs, memory subsystems and interfaces to power the 20-core Arm Grace CPU. The GB10 delivers up to

LatentBreak: A New Attack Method for Language Models

A group of scientists has developed a new way to attack large language models : a method called LatentBreak . Unlike previous techniques, it doesn’t use complex hints or unusual characters that are easily detected by defense systems. LatentBreak instead modifies the query at the level of the hidden representations of the model, choosing formulations that seem innocuous but actually trigger a forbidden response. Previously, methods like GCG, GBDA, SAA, and AutoDAN attempted to trick AI with strange or confusing suffixes that distorted the original suggestion. Such attacks increase the so-called perplexity, a measure of how “natural” the text appears to the

F5 Suffers Security Breach: Source Code and Sensitive Data Stolen

A serious security incident has been reported by F5, a leading provider of application security and delivery solutions. A complex nation-state threat actor had gained long-term access to internal systems, leading to the exfiltration of sensitive files. The compromised data included source code and information about previously undisclosed vulnerabilities. According to the company’s official statement, the actor downloaded files containing proprietary source code for its flagship BIG-IP software, which manages load balancing and security for millions of enterprise applications worldwide. While F5 has stated that no critical exploits or active attacks against its customers have been identified, the breach highlights vulnerabilities inherent

Software Update Renders Jeep 4xe Vehicles Unusable

A software update released last weekend for Jeep 4xe hybrid models caused a serious malfunction: the vehicles stopped working, leaving owners literally stranded. The problem occurred after a failed over-the-air update to the uConnect system on October 10th. The issue blocked the telematics module, rendering the vehicles unusable. On the evening of October 10, reports of widespread failures began appearing on Jeep owner forums. A customer support representative, who went by the name Kori, warned users to refrain from installing the update and promised that the file had already been discontinued. However, for many drivers, it was too late: they had already

But what kind of Sovereign AI is running on the servers and algorithms of a US company!

This year, OpenAI announced a series of projects with foreign governments to create “sovereign AI” systems. According to the company, some of these agreements are currently being negotiated with U.S. authorities. The goal is to give national leaders greater control over technology that has the potential to transform their economies. In recent months, “sovereign AI” has become a buzzword in Washington and Silicon Valley . Advocates believe it’s crucial that systems developed in democratic countries be actively deployed globally, especially as Chinese models are increasingly being exported. In its July AI Action Plan, the Trump administration framed this idea as follows: the

Rootkit on Cisco Devices: Operation Zero Disk Discovered

A sophisticated attack campaign dubbed “Operation Zero Disk” has recently been detected, where threat actors are actively exploiting a critical vulnerability in the Cisco Simple Network Management Protocol (SNMP) to install Linux rootkits on vulnerable network devices. Beginning in October 2025, the campaign impacted corporate networks, highlighting persistent risks in legacy infrastructure. The primary vulnerability, detailed in Cisco’s security advisory, stems from a buffer overflow in the SNMP authentication framework on Cisco IOS XE software. Trend Micro observed an operation exploiting CVE-2025-20352, which allows remote code execution (RCE) and grants persistent unauthorized access, primarily targeting older Cisco switches that lack modern protections.

Australia targeted by Chinese hackers: New intelligence report revealed

The Australian Signals Directorate (ASD) has issued a new warning about the growing activity of Chinese Communist Party-sponsored hacker groups, accused of conducting digital espionage and data theft operations against Australian institutions. The Cyber Threat Report 2024-2025 , released on Tuesday, highlights that over the past year the ASD managed 1,200 cybersecurity incidents , marking an 11% increase over the previous year. APT40: Beijing’s cyber spy The document attributes much of the intrusions to the APT40 group, linked to China’s Ministry of State Security (MSS) . The group is believed to be involved in infiltration campaigns aimed at gathering strategic information from