Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320x100 Itcentric
Cyber Offensive Fundamentals 970x120 V0.1

Author: Redazione RHC

Redazione RHC

The Red Hot Cyber Editorial Team provides daily updates on bugs, data breaches, and global threats. Every piece of content is validated by our community of experts, including Pietro Melillo, Massimiliano Brolli, Sandro Sana, Olivia Terragni, and Stefano Gazzella.

Through synergy with our industry-leading partners—such as Accenture, CrowdStrike, Trend Micro, and Fortinet—we transform technical complexity into collective awareness. We ensure information accuracy by analyzing primary sources and maintaining a rigorous technical peer-review process.

Numero di articoli trovati: 908

The winners of the AI race? Electricians and plumbers.

In an interview with Channel 4 News, Nvidia CEO Jensen Huang said that in the race to succeed in the AI era, "the big winners will be electricians and plumbers."...

SonicWall warns customers to change credentials after security breach

SonicWall has warned its customers to change their login credentials as soon as possible. A cyberattack on MySonicWall accounts compromised firewall configuration backup files. SonicWall reports that, after the incident...

“He doesn’t understand me, but ChatGPT does”: The 21st-century love triangle

The American magazine Futurism has described a new conflict at the intersection of technology and personal life: artificial intelligence bots like ChatGPT are becoming a third party in relationships, often...

From Leash to Autonomy: Ban, Nvidia Block, and Huawei’s AI Cluster Solutions

China's Huawei has taken a major step in developing its own artificial intelligence infrastructure. The company has unveiled solutions designed to increase computing power and reduce dependence on foreign technologies...

Hackers don’t want to save you: they want to erase you.

Hackers are increasingly targeting backups – not systems or servers, but the data that companies retain for a limited period of time so they can recover from attacks. A new...

Edge vs. Chrome: Microsoft promotes its browser with aggressive ads on Bing

Microsoft has once again launched an aggressive campaign for its proprietary Edge browser. This time, the software giant is displaying a comprehensive comparison table between Edge and Chrome directly on...

Will Nvidia’s robotic brain revolutionize artificial intelligence and robotics?

On August 24, the official Nvidia Robotics account shared an image on social media of a black gift box accompanied by a greeting card signed by founder Jensen Huang, with...

RevengeHotels Improves VenomRAT with Artificial Intelligence

Kaspersky Lab experts have detected a new wave of attacks by the RevengeHotels group. A distinctive feature of this campaign is that many of the new malware samples were created...

Root in less than two minutes: How Phoenix exploits vulnerabilities in DDR5 module TRRs.

Anew variant of Rowhammer attacks has been developed that can bypass the latest security mechanisms in SK Hynix DDR5 chips. Dubbed Phoenix, the attack allows root access to DDR5-based systems...

China kicks off the race for innovation with its first AI competition

The city of Karamay, Xinjiang, hosted the opening of the finals and exhibition of the first AI Applications Competition. The event, held at the Museum of Science and Technology, saw...