Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
320x100 Itcentric
Banner Ancharia Desktop 1 1

Author: Redazione RHC

Apple introduces Memory Integrity Enforcement. Will this be the end of hacking?

Apple officially introduced Memory Integrity Enforcement, a new memory protection system that the company calls the most significant advancement ever made in consumer operating system security. It took five years to develop and combine the hardware capabilities of Apple Silicon with the software capabilities of iOS and macOS. According to engineers, iPhone 17 and iPhone Air users now have the industry’s first always-on memory protection, which works without any significant impact on performance. The company emphasizes that, so far, no mass-market malware has managed to penetrate iOS defenses. The only recorded systemic attacks come from the arsenal of commercial spyware used by

Linux in Crisis: Rust Splits Community and Maintainers Leave

The Linux world and its surroundings are going through turbulent times. Developers are debating how to integrate Rust into the kernel while key contributors are leaving. Against the backdrop of these conflicts, talk of possible forks is starting again, but the reality is much more complex: a whole group of alternative operating systems is maturing alongside Linux, each following its own path and demonstrating different approaches to kernel architecture, security, and compatibility. Internal struggles and maintainer resignations Rust’s history has been painful for the kernel community. The ability to use the language in low-level components has opened up new perspectives, but has

Happy Birthday, Super Mario Bros.! 40 years of a game that revolutionized the world.

It’s been exactly four decades since the release of the legendary Super Mario Bros., a project that changed the video game industry forever and became the symbol of an entire era. Super Mario Bros.: The Creators and the Impact It was on September 13, 1985, that the Japanese company Nintendo released its masterpiece for the Famicom console. At the time, few could have imagined that the seemingly simple story of an Italian plumber saving a princess from an evil dragon-turtle would become a global cultural phenomenon. Super Mario Bros. arrived at a turning point for the video game industry. After the collapse

China Makes Historic Turn: Mandatory Labeling of AI-Created Content

A series of Chinese national standards came into force on September 1st, aimed at redefining rules, responsibilities, and controls in increasingly strategic technology and consumer sectors. The State Administration for Market Regulation has published provisions ranging from the identification of synthetic content generated by artificial intelligence to safety standards for electric bicycles and mobile bicycles, with the stated aim of protecting consumers, improving product quality, and supporting the transition to more energy-efficient technologies. Among the most relevant measures is the mandatory standard GB 45438-2025, which defines the methods for identifying synthetic content produced by AI. The text establishes technical procedures and application

Satellite SIEM: US Defense Develops AI to Defend Satellites from Hackers

U.S. defense contractors are developing an artificial intelligence tool called Cyber Resilience On-Orbit (CROO) to detect cyber attacks on satellites by directly monitoring the behavior and telemetry of satellite systems in orbit. The goal is to identify anomalous behavior by leveraging machine learning and artificial intelligence, to understand the true state of satellites beyond simply protecting communication links. The CROO tool was developed by Proof Labs, a space cybersecurity startup based in Albuquerque, New Mexico, with contributions from Big Bear AI, an AI solutions company in Virginia, and Redwire Space Systems, a Florida-based aerospace and defense company. The AI model is trained

OpenAI and Microsoft reach agreement to transform into a public utility company.

OpenAI has entered into a memorandum of understanding with Microsoft to review its partnership, which could lead to the company’s transformation into a Public Benefit Corporation (PBC). If the transformation is approved by regulators, the startup will be able to raise additional capital and go public. Under the terms of the agreement, the nonprofit OpenAI will continue to exist and maintain control over the company’s operations. It will receive a stake in PBC valued at more than $100 billion. Other terms of the agreement are not disclosed. The document has no legal value, but it records the intentions and expectations of the

Nebius, formerly Yandex, signs billion-dollar AI deal with Microsoft

Nebius (formerly Yandex) has announced a major agreement with Microsoft Corporation to lease graphics processing units (GPUs) for artificial intelligence. The agreement involves the lease of capacity in a data center in the US city of Vineland, New Jersey. Under the terms of the agreement, Nebius will provide Microsoft with computing power in installments over the course of 2025 and 2026. Depending on the volume of power supplied, the contract value by 2031 could be as high as $17.4 billion. Microsoft also has the right to purchase additional power, which would increase the contract’s value to $19.4 billion. According to the details

Attention seniors! Ruthless hacker scam: Criminal hackers steal your life savings.

According to the New York State Attorney General’s Office, the primary target of criminal hackers is the elderly and those close to that age. The criminal scenario usually begins with an alarming message about an urgent hacking threat, in which the victim is forced to call a fake support number. The next step is to convince the person to install “protection” software, but in reality this tool allows remote access to the computer. After gaining control, the attackers analyze financial records and identify the most attractive accounts for theft. Subsequently, a second gang member enters the scene, posing as a bank employee.

Quantum algorithm solves complex mathematical problem

Researchers have used a quantum algorithm for the first time to solve a complex mathematical problem that for over a century was considered insurmountable even for the most powerful supercomputers. The problem involves the factorization of group representations, a fundamental operation used in particle physics, materials science, and data communications. The work was led by Los Alamos National Laboratory scientists Martin Larocca and IBM researcher Vojtech Havlicek. The results were published in the journal Physical Review Letters. Scientists recall that Peter Shor demonstrated the possibility of factoring integers on a quantum computer. Now, it has been shown that similar methods are applicable

Sentenced to 4.5 years for piracy: he sold DVDs and films online.

A U.S. court sentenced a Memphis resident to four and a half years in prison for selling digital copies of movies before their official release. Steven R. Hale, 37, who worked at a DVD and Blu-ray production and distribution company, stole soon-to-be-released discs and resold them online. The crimes were committed from February 2021 to March 2022, and in May 2025, Hale pleaded guilty of copyright infringement and agreed to repay damages by returning to his employer approximately 1,160 DVDs and Blu-ray discs seized by investigators. Furthermore, the man was found in possession of a handgun with a loaded magazine and a