Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Ransomfeed 320x100 1
970x20 Itcentric

Category: Cyberpolitics

Rare Earth Elements: US-China Competition Heats Up

An increasingly pressing question is emerging in the United States: after a long series of bans, restrictions, and closures against China, how will the country guarantee the supply of batteries...
Share on Facebook Share on LinkedIn Share on X

US Treasury Removes Sanctions on Intellexa Spyware Developers

The U.S. Treasury Department unexpectedly removed from its sanctions list three individuals previously accused of ties to Intellexa , the developer of the Predator spyware . The decision was made...
Share on Facebook Share on LinkedIn Share on X

China Regulates AI Chatbots with Human-like Interaction

Chatbots are everywhere now. We've all encountered those virtual assistants that answer our questions, provide us with information, and sometimes seem downright intelligent. But what happens when these chatbots become...
Share on Facebook Share on LinkedIn Share on X

The Dark Side of AI Rights: Why Experts Are Urging Caution

As artificial intelligence develops, the debate over its status and the limits of what is permissible is becoming increasingly heated. One of the most respected researchers in this field, Canadian...
Share on Facebook Share on LinkedIn Share on X

Finland Seizes Ship in Cable Damage Probe, Cites Security Threat

On Wednesday, December 31, Finnish authorities seized a cargo ship believed to be involved in the damage to an undersea telecommunications cable connecting Helsinki to Tallinn, Estonia. The action was...
Share on Facebook Share on LinkedIn Share on X

UK Boosts Subsea Cable Protection with Autonomous Vessels

The UK government has announced plans to strengthen the protection of undersea cables using autonomous vessels. Military ships and aircraft will also be involved in this "defense." The UK Ministry...
Share on Facebook Share on LinkedIn Share on X

Uzbekistan License Plate Surveillance System Exposed Online

Cybersecurity specialist Anurag Sen discovered that Uzbekistan's license plate recognition system database was freely accessible online: anyone could access all the information . It is unclear how long the system...
Share on Facebook Share on LinkedIn Share on X

Digital Surveillance at Work: The Rise of Algorithmic Monitoring

Remote work has given employees freedom , but with it has also come digital surveillance . We discussed this some time ago in an article, reporting that these monitoring tools...
Share on Facebook Share on LinkedIn Share on X

Tanks are no longer needed: new wars are fought from a laptop

Author: Roberto Villani, Tanslate: Vincenzo Marcovecchio Why will the cyberg wars, indeed the cyber-guerrillas, be more and more present and involve us more and more? The short century, the 1900s...
Share on Facebook Share on LinkedIn Share on X

Cyber Sabotage Alert: Volt Typhoon Prepares for Destructive Activities

The Australian Security Intelligence Organisation (ASIO) has raised the alarm about the readiness of authoritarian states to go beyond cyber espionage to directly sabotage critical infrastructure. Mike Burgess, head of...
Share on Facebook Share on LinkedIn Share on X