Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Redhotcyber Banner Sito 320x100px Uscita 101125
LECS 970x120 1

Category: Technology Evolution

New submarine cables in the Black Sea: Europe seeks digital independence from Russia

Eastern Europe is preparing for a new phase in telecommunications security. An ambitious submarine cable project, called Kardesa , will connect Bulgaria, Georgia, Turkey, and Ukraine without crossing Russian territorial waters, aiming to reduce dependence on Moscow for digital infrastructure. Construction is scheduled to begin in 2027 . The new route aims to create a more stable and politically independent data corridor between Europe and Asia . Currently, only one cable connects Georgia and Bulgaria across the Black Sea , while other routes remain vulnerable because they pass near Kremlin-influenced routes. Kardesa intends to change this configuration, offering a more direct and

Gemini 3.0 Pro: Google prepares for the generational leap and aims to surpass GPT-5 and Claude 4.5

Over the past few days, some users have received a notification saying that their Gemini Advanced devices have been “upgraded from the previous generation model to the 3.0 Pro, the smartest model yet.” This suggests that Google may be quietly launching the next-generation model. Based on early testing and leaks, Gemini 3.0 Pro is expected to significantly improve programming, user interface design, and multimodal reasoning capabilities; it could play a key role in Gemini Advanced, Google Workspace (Docs, Gmail, Slides), and Gemini Enterprise Edition. Although the official release date is still unclear (it appears to be December), a lot of information is

OpenAI tightens controls on Sora 2 after criticism for videos featuring famous actors

The continued generation of music videos featuring famous actors being posted without their consent on the Sora 2 platform has once again drawn attention to the problems associated with using neural networks to create digital copies of people . After OpenAI’s service published videos generated by Bryan Cranston , including one with Michael Jackson, the company announced it would tighten controls on the use of celebrities’ images and voices. Cranston himself, the actors’ union SAG-AFTRA, and several major agencies ( United Talent Agency, Creative Artists Agency, and the Association of Talent Agents ) issued a joint statement . They emphasized that OpenAI

Malaysia launches new RM2 billion submarine cable for digital revolution

Malaysia has announced the construction of a new submarine fiber-optic cable system to boost connectivity between the eastern and western parts of the country, aiming to support the growth of its digital economy. The Deputy Minister of Communications said on Sunday, October 12, that the government has approved an investment of RM2 billion to build the project, called the Chang Ming Submarine Cable System . The initiative is part of the government’s Madani Submarine Cable Connection (SALAM) program, which aims to improve the national network infrastructure. The system, approximately 3,190 kilometres long, will connect East and West Malaysia, providing increased data transmission

Chrome for Android: From a “wall of text” to a podcast is a short step.

Google has added a new AI-powered feature to Chrome for Android for reading web pages. Instead of reading the entire text aloud, the browser can summarize the material in a “podcast” format : two synthesized speakers discuss key points, turning a long article into a short, lively audio. Early users noticed the new feature in the stable build of Chrome 140.0.7339.124, so it looks like the feature is gradually rolling out to a wider audience. You can enable voiceover the same way: open a page, click the three dots in the upper right corner, and select “Listen to this page.” A new

Removing private data from AI models? Now you can without accessing the original datasets.

A team from the University of California, Riverside, has demonstrated a new way to remove private and copyrighted data from AI models without accessing the original datasets. The solution addresses the problem of personal and paid content being reproduced almost verbatim in responses, even when the sources are removed or locked behind passwords and paywalls. The approach is called “source-free certified unlearning.” A surrogate set that is statistically similar to the original is used. The model parameters are modified as if it were retrained from scratch. Carefully calculated random noise is introduced to ensure cancellation. The method features a novel noise calibration

Frontier supercomputer surpasses Fugaku to become world’s fastest

The supercomputer “Fugaku,” developed by Fujitsu in collaboration with the RIKEN Institute of Physical and Chemical Research, dominated the rankings of the world’s fastest machines for years thanks to its ARM architecture. Its supremacy, however, was broken by a new player: “Frontier.” “Frontier” has claimed the title of fastest supercomputer, returning the x86 architecture to the top after Fugaku’s long dominance. This achievement represents a significant shift in the landscape of high-performance computing systems. The machine uses AMD’s third-generation EPYC server processors, codenamed “Milan, coupled with the Instinct MI250X accelerated graphics card, designed with an OCP accelerator module. The combination of these

Artificial consciousness: abroad it’s science, in Italy it’s taboo.

Abroad, it’s already a recognized field of study, but here it’s almost taboo: a journey through science, philosophy, and ethical perspectives. 1. The Great Italian Absentee In Italy, artificial intelligence is a ubiquitous topic: from job risks to disinformation, from cyberwar to algorithms that drive consumption and opinions. But the concept of artificial consciousness—the possibility that a digital system develops forms of awareness or vulnerability—remains taboo.On the international scene, however, it is by no means a drawing-room exercise: it is now an object of systematic study, as highlighted in the systematic review by Sorensen & Gemini2.5Pro (July 2025), which documents the transition

What is Wetware: The Future of Brain Enhancement Through Hardware and Software

By definition, wetware refers to technology that combines hardware and software to enhance biological life forms. Steve M. Potter, an associate professor at the Neuroengineering Laboratory at the University of Georgia, has predicted that a new revolution is coming. But when will all this happen? In fact, it’s already happening. What is wetware? Since 1996, Potter has been involved in cutting-edge research on “the possibilities for developing hardware-enhanced cognition in people.” In fact, in the essay “The future of computing and neural interfacing“, Potter describes that all life as we know it is made of cells, which are “soft and full of

HoneyPLC: the new honeypot that revolutionizes the defense of industrial plants

Industrial Control Systems (ICS), critical to the operation of critical infrastructure such as power, water and transportation networks, are increasingly vulnerable to cyberattacks. In this context, the article HoneyPLC: A Next-Generation Honeypot for Industrial Control Systemse proposes an advanced and scalable honeypot designed to simulate real PLCs (programmable logic controllers) and automatically collect malware, in particular malicious code written in ladder logic, significantly improving the state of the art in ICS protection. Unlike traditional honeypots, HoneyPLC stands out in three key ways: high interactivity, large scalability, and deception capabilities. It can faithfully emulate industrial network protocols, providing interaction similar to that of