The new cable cutter, developed by the China Shipbuilding Research Center, is designed for use on advanced submarines such as the Fengdou and Haidou series. The device is capable of...
The Darklab team, Red Hot Cyber's community of threat intelligence experts, has identified an ad on the dark web marketplace "Tor Amazon", the criminal counterpart of the popular e-commerce site...
In recent years, a particularly insidious form of phishing has become widespread: Quishing or QRishing, a strategy based on the use of QR codes containing malicious links that, once scanned,...
Today, Thursday, September 4, 2025, US President Donald Trump will host over two dozen technology and business leaders for a dinner in the newly renovated White House Rose Garden. An...
The Red Hot Cyber Conference has become a regular event for the Red Hot Cyber community and for anyone working in or interested in the world of digital technologies and...
Microsoft today introduced POML (Prompt Orchestration Markup Language), a new markup language for prompt orchestration and specifically designed to enable rapid and structured prototyping of large language models (LLMs). POML...
A unified and secure approach to support digital transformation, enable hybrid working, and reduce operational complexity. By Federico Saraò, Specialized System Engineer SASE, Fortinet Italy The nature of a company's...
Automaker Jaguar Land Rover (JLR) announced that it was forced to disable several systems due to a hacker attack. The incident appears to have impacted the automaker's manufacturing and retail...
The global data center industry is preparing for a sharp increase in computing platforms for AI demands. According to Goldman Sachs, installed data center capacity will grow by approximately 50%...
A data intrusion was detected by Cloudflare, where an experienced attacker was able to access and steal sensitive customer data from the company's Salesforce instance. The breach was part of...