Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
320×100
2nd Edition GlitchZone RHC 970x120 2

Category: Technology Evolution

Frontier supercomputer surpasses Fugaku to become world’s fastest

The supercomputer “Fugaku,” developed by Fujitsu in collaboration with the RIKEN Institute of Physical and Chemical Research, dominated the rankings of the world’s fastest machines for years thanks to its ARM architecture. Its supremacy, however, was broken by a new player: “Frontier.” “Frontier” has claimed the title of fastest supercomputer, returning the x86 architecture to the top after Fugaku’s long dominance. This achievement represents a significant shift in the landscape of high-performance computing systems. The machine uses AMD’s third-generation EPYC server processors, codenamed “Milan, coupled with the Instinct MI250X accelerated graphics card, designed with an OCP accelerator module. The combination of these

Artificial consciousness: abroad it’s science, in Italy it’s taboo.

Abroad, it’s already a recognized field of study, but here it’s almost taboo: a journey through science, philosophy, and ethical perspectives. 1. The Great Italian Absentee In Italy, artificial intelligence is a ubiquitous topic: from job risks to disinformation, from cyberwar to algorithms that drive consumption and opinions. But the concept of artificial consciousness—the possibility that a digital system develops forms of awareness or vulnerability—remains taboo.On the international scene, however, it is by no means a drawing-room exercise: it is now an object of systematic study, as highlighted in the systematic review by Sorensen & Gemini2.5Pro (July 2025), which documents the transition

HoneyPLC: the new honeypot that revolutionizes the defense of industrial plants

Industrial Control Systems (ICS), critical to the operation of critical infrastructure such as power, water and transportation networks, are increasingly vulnerable to cyberattacks. In this context, the article HoneyPLC: A Next-Generation Honeypot for Industrial Control Systemse proposes an advanced and scalable honeypot designed to simulate real PLCs (programmable logic controllers) and automatically collect malware, in particular malicious code written in ladder logic, significantly improving the state of the art in ICS protection. Unlike traditional honeypots, HoneyPLC stands out in three key ways: high interactivity, large scalability, and deception capabilities. It can faithfully emulate industrial network protocols, providing interaction similar to that of

Cyber Security: CISA and NSA Recommend Secure Programming Languages

The main US cybersecurity agencies, CISA and NSA, have published a joint document recommending that software developers opt for programming languages considered “memory safe”. These languages are designed to provide protection against critical crashes caused by memory management errors, which are one of the most dangerous and frequent types of vulnerabilities. The document highlights that unauthorized memory access errors continue to be a major threat to both regular users and critical information systems. However, languages such as Rust, Go, C#, Java, Swift, Python and JavaScript mitigate this risk by performing static checks on memory allocation during compilation, significantly reducing the likelihood of

Pope warns: “AI is not the devil, but it can become one without ethics”

The head of the Catholic Churchhas expressed concern about the way today’s children and adolescents interact with digital technologies. In his viewthe abundance of information available through neural networks and other intelligent systems can seriously affect the mental and intellectual development of the younger generations. Pope Leo XIV has warned of the risks thatthe rapid development of artificial intelligence could pose to young people. He expressed his position at the Second Annual Rome Conference on AI, part of which is being held in the Vatican. At the same time, the Pontiff noted that artificial intelligence in itself does not pose a threat. It can be

“Cleaning Up” Windows Update! Microsoft Declares War on Drivers Exploited in Ransomware Attacks

Microsoft announced that it will periodically remove outdated drivers from the Windows Update Catalog to reduce risk and improve compatibility. “The goal of this initiative is to provide the best set of drivers on Windows Update for the various hardware solutions in the Windows ecosystem and help keep Microsoft Windows secure,” the company said in a statement. Microsoft also added that “This initiative will periodically clean up drivers on Windows Update, which will result in some drivers not being deployed on systems in our ecosystem.” As the company has clarified, the first phase of the “cleanup” procedure will affect drivers for which Windows Update

Your VPN is a Trojan! Here are 17 Free Apps Made in China That Spy on You While Google and Apple Get Fat

“If you don’t pay for the service, you are the product. This is true for social networks, but also for free VPNs: your data, your privacy, is often the real price to pay. Researchers at the Tech Transparency Projecthave reported that at least 17 free VPN apps with alleged ties to China are still available in the US versions of the Apple and Google stores, and big tech companies are managing to make money from these apps despite the risks to user privacy. The first investigation by TTP surfaced in April, revealing that the data of millions of users from more than two

Bringing Your Imagination to Life: AI-Generated Images from Your Description

Remember when you had a vivid image in your mind but struggled to describe it to someone else? Maybe it was a character from a dream, a breathtaking landscape, or a unique design you wished existed in reality. Back then, we relied on that one talented artistic friend to bring our visions to life. But explaining a mental image was often frustrating after all, you were relying on another person’s interpretation of your words, which often led to results that weren’t quite what you had in mind. AI image generators use deep learning algorithms to interpret text descriptions and transform them into

NIST selects second PQC Key Encapsulation algorithm

The fourth round of the American National Institute of Standards and Technology (NIST) Post Quantum Cryptography (PQC) competition has selected HQC as a secondary quantum-resilient key encapsulation mechanism (KEM) to the previously selected ML-KEM (based on CRYSTALS-Kyber). HQC, or “Hemming Quasi-Cyclic” in full, is a code-based KEM which utilises the cryptographically challenging Quasi-Cyclic Syndrome Decoding Problem as its base and built around the concept of error-correcting codes. NIST has stated that they have selected HQC as a backup algorithm to ML-KEM, which utilises a different mathematical approach. ML-KEM is a modular lattice-based algorithm which was first selected by NIST in 2022, and

Interviewing ChatGPT: the AI that feels human, to its Asperger’s users.

Have you ever experienced that ChatGPT recognizes who it is talking to? I share my ChatGPT account with my spouse, and when he uses it, he gets the generic, prepackaged answers that most users receive. However, I get a more human-like, personal response that almost sounds like myself responding. The difference in our usage is that he treats it as a tool with direct research requests, while I interact with it in a more human-like way, using phrases like “please,” “may you,” “do you mind,” and “thank you” when I ask for help. We have never disclosed that two different people are