Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
TM RedHotCyber 320x100 042514
Banner Desktop

Category: innovation

Removing private data from AI models? Now you can without accessing the original datasets.

A team from the University of California, Riverside, has demonstrated a new way to remove private and copyrighted data from AI models without accessing the original datasets. The solution addresses the problem of personal and paid content being reproduced almost verbatim in responses, even when the sources are removed or locked behind passwords and paywalls. The approach is called “source-free certified unlearning.” A surrogate set that is statistically similar to the original is used. The model parameters are modified as if it were retrained from scratch. Carefully calculated random noise is introduced to ensure cancellation. The method features a novel noise calibration

Frontier supercomputer surpasses Fugaku to become world’s fastest

The supercomputer “Fugaku,” developed by Fujitsu in collaboration with the RIKEN Institute of Physical and Chemical Research, dominated the rankings of the world’s fastest machines for years thanks to its ARM architecture. Its supremacy, however, was broken by a new player: “Frontier.” “Frontier” has claimed the title of fastest supercomputer, returning the x86 architecture to the top after Fugaku’s long dominance. This achievement represents a significant shift in the landscape of high-performance computing systems. The machine uses AMD’s third-generation EPYC server processors, codenamed “Milan, coupled with the Instinct MI250X accelerated graphics card, designed with an OCP accelerator module. The combination of these

Artificial consciousness: abroad it’s science, in Italy it’s taboo.

Abroad, it’s already a recognized field of study, but here it’s almost taboo: a journey through science, philosophy, and ethical perspectives. 1. The Great Italian Absentee In Italy, artificial intelligence is a ubiquitous topic: from job risks to disinformation, from cyberwar to algorithms that drive consumption and opinions. But the concept of artificial consciousness—the possibility that a digital system develops forms of awareness or vulnerability—remains taboo.On the international scene, however, it is by no means a drawing-room exercise: it is now an object of systematic study, as highlighted in the systematic review by Sorensen & Gemini2.5Pro (July 2025), which documents the transition

What is Wetware: The Future of Brain Enhancement Through Hardware and Software

By definition, wetware refers to technology that combines hardware and software to enhance biological life forms. Steve M. Potter, an associate professor at the Neuroengineering Laboratory at the University of Georgia, has predicted that a new revolution is coming. But when will all this happen? In fact, it’s already happening. What is wetware? Since 1996, Potter has been involved in cutting-edge research on “the possibilities for developing hardware-enhanced cognition in people.” In fact, in the essay “The future of computing and neural interfacing“, Potter describes that all life as we know it is made of cells, which are “soft and full of

HoneyPLC: the new honeypot that revolutionizes the defense of industrial plants

Industrial Control Systems (ICS), critical to the operation of critical infrastructure such as power, water and transportation networks, are increasingly vulnerable to cyberattacks. In this context, the article HoneyPLC: A Next-Generation Honeypot for Industrial Control Systemse proposes an advanced and scalable honeypot designed to simulate real PLCs (programmable logic controllers) and automatically collect malware, in particular malicious code written in ladder logic, significantly improving the state of the art in ICS protection. Unlike traditional honeypots, HoneyPLC stands out in three key ways: high interactivity, large scalability, and deception capabilities. It can faithfully emulate industrial network protocols, providing interaction similar to that of

Cyber Security: CISA and NSA Recommend Secure Programming Languages

The main US cybersecurity agencies, CISA and NSA, have published a joint document recommending that software developers opt for programming languages considered “memory safe”. These languages are designed to provide protection against critical crashes caused by memory management errors, which are one of the most dangerous and frequent types of vulnerabilities. The document highlights that unauthorized memory access errors continue to be a major threat to both regular users and critical information systems. However, languages such as Rust, Go, C#, Java, Swift, Python and JavaScript mitigate this risk by performing static checks on memory allocation during compilation, significantly reducing the likelihood of

Pope warns: “AI is not the devil, but it can become one without ethics”

The head of the Catholic Churchhas expressed concern about the way today’s children and adolescents interact with digital technologies. In his viewthe abundance of information available through neural networks and other intelligent systems can seriously affect the mental and intellectual development of the younger generations. Pope Leo XIV has warned of the risks thatthe rapid development of artificial intelligence could pose to young people. He expressed his position at the Second Annual Rome Conference on AI, part of which is being held in the Vatican. At the same time, the Pontiff noted that artificial intelligence in itself does not pose a threat. It can be

“Cleaning Up” Windows Update! Microsoft Declares War on Drivers Exploited in Ransomware Attacks

Microsoft announced that it will periodically remove outdated drivers from the Windows Update Catalog to reduce risk and improve compatibility. “The goal of this initiative is to provide the best set of drivers on Windows Update for the various hardware solutions in the Windows ecosystem and help keep Microsoft Windows secure,” the company said in a statement. Microsoft also added that “This initiative will periodically clean up drivers on Windows Update, which will result in some drivers not being deployed on systems in our ecosystem.” As the company has clarified, the first phase of the “cleanup” procedure will affect drivers for which Windows Update

Your VPN is a Trojan! Here are 17 Free Apps Made in China That Spy on You While Google and Apple Get Fat

“If you don’t pay for the service, you are the product. This is true for social networks, but also for free VPNs: your data, your privacy, is often the real price to pay. Researchers at the Tech Transparency Projecthave reported that at least 17 free VPN apps with alleged ties to China are still available in the US versions of the Apple and Google stores, and big tech companies are managing to make money from these apps despite the risks to user privacy. The first investigation by TTP surfaced in April, revealing that the data of millions of users from more than two

Bringing Your Imagination to Life: AI-Generated Images from Your Description

Remember when you had a vivid image in your mind but struggled to describe it to someone else? Maybe it was a character from a dream, a breathtaking landscape, or a unique design you wished existed in reality. Back then, we relied on that one talented artistic friend to bring our visions to life. But explaining a mental image was often frustrating after all, you were relying on another person’s interpretation of your words, which often led to results that weren’t quite what you had in mind. AI image generators use deep learning algorithms to interpret text descriptions and transform them into