Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
UtiliaCS 320x100
UtiliaCS 970x120

Author: Redazione RHC

The Story of Microsoft Solitaire: From Launch with Windows 3.0 to Enduring Success

Microsoft first released Solitaire in 1990 with Windows 3.0, as a tool to familiarize users with the graphical interface and mouse use. The game was created by Wes Cherry, with design assistance from Susan Kare, and has become one of the most widely used software programs in Windows history. Since its introduction, Solitaire has become incredibly popular in offices and schools, so much so that Microsoft has received complaints about lost productivity due to time spent playing it . A well-known story tells of an employee in New York City being fired after Mayor Bloomberg saw the game on his screen. In

Removing private data from AI models? Now you can without accessing the original datasets.

A team from the University of California, Riverside, has demonstrated a new way to remove private and copyrighted data from AI models without accessing the original datasets. The solution addresses the problem of personal and paid content being reproduced almost verbatim in responses, even when the sources are removed or locked behind passwords and paywalls. The approach is called “source-free certified unlearning.” A surrogate set that is statistically similar to the original is used. The model parameters are modified as if it were retrained from scratch. Carefully calculated random noise is introduced to ensure cancellation. The method features a novel noise calibration

Edge vs. Chrome: Microsoft promotes its browser with aggressive ads on Bing

Microsoft has once again launched an aggressive campaign for its proprietary Edge browser. This time, the software giant is displaying a comprehensive comparison table between Edge and Chrome directly on the search page when a user attempts to download Google’s web browser via Bing. According to windowslatest , these ads may appear under certain conditions. For example, the comparison chart is visible to users signed in to a Microsoft account with an active Microsoft 365 subscription and Windows 11 24/7. This could indicate that Microsoft is testing the new ads on a limited number of subscribers. When a user tried to download

Will Nvidia’s robotic brain revolutionize artificial intelligence and robotics?

On August 24, the official Nvidia Robotics account shared an image on social media of a black gift box accompanied by a greeting card signed by founder Jensen Huang, with the caption “Enjoy.” The announcement anticipated the launch of a new robot “brain,” suggesting a significant shift in the company’s robotics strategy. In the presentation video, a humanoid robot from Chinese manufacturer Fourier picks up the greeting card and begins reading it, while opening the package reveals different types of arms. This detail suggests that the new brain could be compatible with multiple humanoid robot models, increasing the system’s versatility. In recent

Qilin leads ransomware attacks as new groups emerge underground

Qilin continues to lead the way among all active crypto attack groups, significantly lagging behind its competitors in the number of reported incidents. According to a recent Cyble report, the group attacked 104 organizations in August alone, while its closest rival, Akira, only affected 56 victims. Nonetheless, new actors have emerged, whose rapid activity could dramatically shift the balance of power in the ransomware landscape in the near future. The total number of attacks recorded in August reached 467, marking the fourth consecutive month of such growth. of incidents. The peak recorded in February remains unsurpassed. Particularly alarming is the growing trend

RevengeHotels Improves VenomRAT with Artificial Intelligence

Kaspersky Lab experts have detected a new wave of attacks by the RevengeHotels group. A distinctive feature of this campaign is that many of the new malware samples were created using artificial intelligence. RevengeHotels (also known as TA558) has been active since 2015 and specializes in stealing credit card data from hotel guests and travelers. Criminal hackers typically send emails with phishing links that redirect visitors to websites disguised as document storage sites. These websites download malicious scripts that infect the targeted computers. The final payloads are various remote access trojans (RATs) that allow attackers to control compromised systems, steal sensitive data,

Security Alert: Vulnerability in Ivanti Endpoint Manager Mobile. CISA Warns

The U.S. Cybersecurity Agency (CISA) has issued an alert regarding two malware kits discovered on the network of an unidentified organization after exploiting new vulnerabilities in the Ivanti Endpoint Manager Mobile (EPMM) mobile device management system. Attackers exploited the CVE-2025-4427 and CVE-2025-4428 vulnerabilities, both of which were used in zero-day attacks before the release of Ivanti updates in May. 2025. The first vulnerability allows authentication bypass and access to protected resources, while the second allows remote code execution. Together, they allow the unauthorized execution of arbitrary commands on the vulnerable EPMM server. CISA notes that the attack began around May 15, 2025,

Root in less than two minutes: How Phoenix exploits vulnerabilities in DDR5 module TRRs.

Anew variant of Rowhammer attacks has been developed that can bypass the latest security mechanisms in SK Hynix DDR5 chips. Dubbed Phoenix, the attack allows root access to DDR5-based systems in less than two minutes. Recall that the original Rowhammer attack was devised by experts at Carnegie Mellon University in 2014. Its essence lies in the fact that intense manipulation of some memory cells can cause a change in the state of bits in adjacent cells. Memory cells store information in the form of electrical charges, which determine the value of the bits within them, i.e., 1 or 0. Due to the

China kicks off the race for innovation with its first AI competition

The city of Karamay, Xinjiang, hosted the opening of the finals and exhibition of the first AI Applications Competition. The event, held at the Museum of Science and Technology, saw twenty-four projects compete for the final prizes in nine key areas, from healthcare to industrial energy to education. The event also included an exhibition of results, the signing of agreements, and an awards ceremony, aiming to highlight the role of AI in local development and the construction of a “city of computational power.” The competition, titled “Walking with Digitalization, Empowering Development,” was organized by the Karamay Municipal Party Committee and Administration, together

A major cyberattack hits European airports. Flights grounded.

On Saturday, September 20, 2025, a cyberattack hit a service provider used by several European airports, including Brussels, Berlin, and London Heathrow. The incident caused significant disruption, with flight delays and cancellations. https://www.redhotcyber.com/post/attacco-informatico-colpisce-gli-aeroporti-europei/The company involved, Collins Aerospace, announced that it is experiencing international technical issues affecting its airport management systems. The company has assured that its technicians are working to restore the situation to normal. “Collins Aerospace is working to quickly resolve the issue,” reads the official statement published on Heathrow’s social media channels. At Heathrow, airport authorities have advised travelers to check the status of their flights before leaving home and