Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Ancharia Mobile 1
Crowdstriker 970×120

Category: Technology Evolution

Managing AI Agents: Mitigating Security Risks in Autonomous Systems

The widespread adoption of artificial intelligence in businesses is profoundly transforming operational processes and, at the same time, introducing new security vulnerabilities . Companies are using these systems to increase productivity and strengthen competitiveness, but their increasing autonomy requires a rethinking of control and governance rules. AI-powered assistants no longer perform just support tasks, such as composing emails or writing summaries. In many organizations , they are now able to initiate work orders, analyze technical logs, manage accounts, and automatically respond to anomalies. These functions, typical of the new generation of ” agentive ” agents, allow systems to take direct action in

Mistral AI Unveils Powerful Open Source Models for Advanced AI Applications

French company Mistral AI has unveiled its Mistral 3 line of models, making them fully open source under the Apache 2.0 license . The series includes several compact and dense models with 3, 8, and 14 billion parameters , as well as the flagship Mistral Large 3 model. This is a ” Mixture-of-Experts ” model with 41 billion active parameters and 675 billion shared parameters , which the company calls its most powerful solution to date. Mistral Large 3 was trained from scratch on approximately 3,000 NVIDIA H200 GPUs. After further training, the model achieved the level of the best open-source training

ENISA takes on the role of Root in the European Cybersecurity Initiative (CVE).

The European Union Agency for Cybersecurity (ENISA) has taken on the role of Root within the Common Vulnerabilities and Exposures (CVE) programme, becoming the main point of reference for national authorities, EU CSIRTs and partners falling within its mandate. The new role expands on the Agency’s existing functions as Vulnerability Numbering Authority (CNA), which is responsible for assigning CVE identifiers and publishing the related records for reports managed by European CSIRTs, an operational role that has been active since January 2024. ENISA Executive Director Juhan Lepassaar highlighted how this change strengthens the Agency’s ability to support vulnerability management within the Union, contributing

Be careful when using SSDs! Without power, you risk data loss

XDA Developers reminds us that using solid-state drives for long-term storage is risky. If SSDs are left without power for years, data can become corrupted or even disappear entirely. Unlike HDDs , which store data on magnetized platters, SSDs write information by changing the electrical charge in NAND flash cells . Flash memory is considered non-volatile: data is retained even after power is lost. However, the length of time an SSD can reliably store data without being connected to a power source is limited. According to Joint Electron Device Engineering Council (JEDEC) specifications, even inexpensive drives with QLC NAND can retain data

Quantum Computing vs. Artificial Intelligence: Which Will Really Change the Future?

Quantum mechanics remains a complex and mysterious field, both difficult to explain and difficult to understand. This branch of physics studies the unusual behavior of tiny particles, phenomena that are opening up new scientific possibilities with potentially revolutionary applications. Despite the pronouncements and investments of tech giants like Microsoft and Google, quantum computing remains less visible compared to the growing focus on artificial intelligence (AI). Generally, while AI is predominantly software-oriented and relies on existing hardware, quantum technology requires specialized physical devices such as sensors and quantum computers, which are still bulky, expensive, and rare today. Brian Hopkins , vice president and

Satoshi Nakamoto’s Net Worth Drops 34% as Cryptocurrency Crash

The net worth of Satoshi Nakamoto, the mysterious figure known as the founder of Bitcoin, has dropped 34% in the last month due to the recent virtual asset crash . Industry analysts say this isn’t simply a price correction, but rather a sign that the cryptocurrency market’s resilience is faltering due to structural factors such as the AI bubble controversy, uncertainty over the US Federal Reserve’s interest rates, and the risks of quantum computing. According to Benzinga, Nakamoto’s estimated wealth fell from its October peak of $137 billion to its current value of $90.7 billion on the 24th (local time). The overall

Veeam launches Data Platform v13, redefining the standard for cyber resilience and advanced data protection.

With new capabilities to stay ahead of threats and accelerate recovery with next-generation security, forensic insights and intelligent automation, Veeam also launches the Universal Hypervisor Integration API, a flexible integration platform for hypervisors . Seattle, WA – November 19, 2025 – Veeam® Software , the #1 global leader in data resilience, today launched Veeam Data Platform v13 – a breakthrough release that redefines the standard for cyber resilience, intelligent data protection, and data freedom in the AI era. This release represents a fundamental evolution of the industry’s most trusted data platform. Designed for a world of relentless ransomware, rapid infrastructure transformation, and

John von Neumann: The Multifaceted Genius of 20th-Century Science

We meet the man considered one of the most multifaceted and brilliant scientists of the last century, perhaps equal only to Einstein. He possessed a wide range of scientific talents, developed in part thanks to a stimulating environment; indeed, in those years, Hungary offered a very flourishing mathematical landscape. These abilities were discovered by his math teacher, László Rátz, a renowned professor at a Lutheran school in Budapest. Neumann’s knowledge spanned mathematics, physics, chemistry, and algebra, to name a few. His innovative ideas and kaleidoscopic mind generated and brought to life new solutions that still form the basis of the technological tools

Hallucination in Artificial Intelligence: Between Strange and Disturbing Errors

Hallucinating, for a human, means perceiving things that aren’t actually present in our environment. When we talk about “hallucinations” in artificial intelligence (AI), we’re referring to a situation in which an AI model “sees” or “interprets” something that isn’t actually present in the data . But how can a machine “hallucinate”? Let’s find out. An artificial intelligence model, like a neural network, somewhat emulates the functioning of neurons in the human brain. These models learn from large volumes of data and, through this learning, develop the ability to perform tasks such as recognizing images, interpreting language, and much more. An AI model

Remember NVIDIA DGX Spark? Here comes the GMKtec EVO-X2, at half the price.

Chinese manufacturer GMKtec has presented its new EVO-X2 mini PC , equipped with a Ryzen AI Max+ 395 processor , claiming performance comparable – and in some cases superior – to that of the NVIDIA DGX Spark mini supercomputer, but at a significantly lower price. The DGX Spark was officially launched after nearly a year of development, priced at $3,999 . GMKtec, on the other hand, offers its EVO-X2 at less than half the cost of the NVIDIA model. In internal tests published on the official GMKtec blog, the EVO-X2 mini PC was pitted against the DGX Spark on several large open