Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
2nd Edition GlitchZone RHC 320x100 2
UtiliaCS 970x120

Category: Technology Evolution

Cyber Security: CISA and NSA Recommend Secure Programming Languages

The main US cybersecurity agencies, CISA and NSA, have published a joint document recommending that software developers opt for programming languages considered “memory safe”. These languages are designed to provide protection against critical crashes caused by memory management errors, which are one of the most dangerous and frequent types of vulnerabilities. The document highlights that unauthorized memory access errors continue to be a major threat to both regular users and critical information systems. However, languages such as Rust, Go, C#, Java, Swift, Python and JavaScript mitigate this risk by performing static checks on memory allocation during compilation, significantly reducing the likelihood of

Pope warns: “AI is not the devil, but it can become one without ethics”

The head of the Catholic Churchhas expressed concern about the way today’s children and adolescents interact with digital technologies. In his viewthe abundance of information available through neural networks and other intelligent systems can seriously affect the mental and intellectual development of the younger generations. Pope Leo XIV has warned of the risks thatthe rapid development of artificial intelligence could pose to young people. He expressed his position at the Second Annual Rome Conference on AI, part of which is being held in the Vatican. At the same time, the Pontiff noted that artificial intelligence in itself does not pose a threat. It can be

“Cleaning Up” Windows Update! Microsoft Declares War on Drivers Exploited in Ransomware Attacks

Microsoft announced that it will periodically remove outdated drivers from the Windows Update Catalog to reduce risk and improve compatibility. “The goal of this initiative is to provide the best set of drivers on Windows Update for the various hardware solutions in the Windows ecosystem and help keep Microsoft Windows secure,” the company said in a statement. Microsoft also added that “This initiative will periodically clean up drivers on Windows Update, which will result in some drivers not being deployed on systems in our ecosystem.” As the company has clarified, the first phase of the “cleanup” procedure will affect drivers for which Windows Update

Your VPN is a Trojan! Here are 17 Free Apps Made in China That Spy on You While Google and Apple Get Fat

“If you don’t pay for the service, you are the product. This is true for social networks, but also for free VPNs: your data, your privacy, is often the real price to pay. Researchers at the Tech Transparency Projecthave reported that at least 17 free VPN apps with alleged ties to China are still available in the US versions of the Apple and Google stores, and big tech companies are managing to make money from these apps despite the risks to user privacy. The first investigation by TTP surfaced in April, revealing that the data of millions of users from more than two

Bringing Your Imagination to Life: AI-Generated Images from Your Description

Remember when you had a vivid image in your mind but struggled to describe it to someone else? Maybe it was a character from a dream, a breathtaking landscape, or a unique design you wished existed in reality. Back then, we relied on that one talented artistic friend to bring our visions to life. But explaining a mental image was often frustrating after all, you were relying on another person’s interpretation of your words, which often led to results that weren’t quite what you had in mind. AI image generators use deep learning algorithms to interpret text descriptions and transform them into

NIST selects second PQC Key Encapsulation algorithm

The fourth round of the American National Institute of Standards and Technology (NIST) Post Quantum Cryptography (PQC) competition has selected HQC as a secondary quantum-resilient key encapsulation mechanism (KEM) to the previously selected ML-KEM (based on CRYSTALS-Kyber). HQC, or “Hemming Quasi-Cyclic” in full, is a code-based KEM which utilises the cryptographically challenging Quasi-Cyclic Syndrome Decoding Problem as its base and built around the concept of error-correcting codes. NIST has stated that they have selected HQC as a backup algorithm to ML-KEM, which utilises a different mathematical approach. ML-KEM is a modular lattice-based algorithm which was first selected by NIST in 2022, and

Interviewing ChatGPT: the AI that feels human, to its Asperger’s users.

Have you ever experienced that ChatGPT recognizes who it is talking to? I share my ChatGPT account with my spouse, and when he uses it, he gets the generic, prepackaged answers that most users receive. However, I get a more human-like, personal response that almost sounds like myself responding. The difference in our usage is that he treats it as a tool with direct research requests, while I interact with it in a more human-like way, using phrases like “please,” “may you,” “do you mind,” and “thank you” when I ask for help. We have never disclosed that two different people are

Microsoft presents Majorana 1: The Quantum Processor Promising to Reshape the Future

Microsoft has taken a significant step forward in the field of quantum computing with the launch of its first quantum processor: Majorana 1. Unlike most quantum chips that are based on electron-based qubits, this revolutionary processor exploits Majorana particles, a revolutionary development in the field. At the World Governments Summit in Dubai last week, Google CEO Sundar Pichai compared quantum computing to artificial intelligence from a decade ago, highlighting its potential to reshape the future. Despite its promises, quantum computing remains one of the most complex challenges in modern science. Microsoft presents Majorana 1 In a revolutionary announcement on Wednesday, Microsoft presented

Cryptography at Risk: MIT develops a Quantum Algorithm to crack RSA.

Modern encryption methods, such as RSA, are based on the fact that even the most powerful classical computers are not able to quickly decompose a large number into prime factors. However, quantum computers promise to considerably accelerate this process, thanks to an algorithm proposed by Peter Shor in 1994, which demonstrated that a quantum computer could break RSA encryption. Over the last 30 years, scientists have been actively developing quantum computers, but up until now they have not been able to create a powerful enough device to execute Shor’s algorithm. It requires a quantum computer with about 20 million qubits, while modern

The other side of cybersecurity: stress and burnout are “by design” in domain experts

We often talk about cyber security and the importance of a complete cyber program today. Today, however, we will focus on analyzing another important point in the profession of the cyber security expert : stress. Many aspiring cybersecurity professionals dream of establishing themselves firmly in the industry and one day even taking on a leadership position by becoming a CISO in some large company. However, before you strive for career growth and increased responsibility, you should be aware of all the pitfalls that plague the industry, which are often not talked about. Working in the cybersecurity industry comes with significant stress and