Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
UtiliaCS 320x100
Fortinet 970x120px

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

PollyPolymer Revolutionizes Robotics with 3D Printed Flexible Components Cybercrime

PollyPolymer Revolutionizes Robotics with 3D Printed Flexible Components

When XPeng unveiled its new humanoid robot this year, the spectacle was designed to inspire disbelief. The robot's movements were...
Redazione RHC - 2 January 2026
GlassWorm Malware Targets macOS via Open VSX Extensions Cybercrime

GlassWorm Malware Targets macOS via Open VSX Extensions

A new wave of malicious extensions has been discovered in the Open VSX extension store, used by millions of developers....
Redazione RHC - 2 January 2026
AI Job Losses: Geoffrey Hinton Warns of Widespread Unemployment by 2026 Cybercrime

AI Job Losses: Geoffrey Hinton Warns of Widespread Unemployment by 2026

Computer science professor Geoffrey Hinton , one of the founders of modern artificial intelligence technologies, has claimed that AI could...
Redazione RHC - 2 January 2026
NVIDIA Tegra X2 Vulnerability: Millions of Devices at Risk Cybercrime

NVIDIA Tegra X2 Vulnerability: Millions of Devices at Risk

At the 39th annual Chaos Communications Conference (39C3) , security researcher Amber Katze, 22, announced that she has completely analyzed...
Redazione RHC - 1 January 2026
China Regulates AI Chatbots with Human-like Interaction Cybercrime

China Regulates AI Chatbots with Human-like Interaction

Chatbots are everywhere now. We've all encountered those virtual assistants that answer our questions, provide us with information, and sometimes...
Redazione RHC - 1 January 2026
The Dark Side of AI Rights: Why Experts Are Urging Caution Cybercrime

The Dark Side of AI Rights: Why Experts Are Urging Caution

As artificial intelligence develops, the debate over its status and the limits of what is permissible is becoming increasingly heated....
Redazione RHC - 1 January 2026

PollyPolymer Revolutionizes Robotics with 3D Printed Flexible Components

When XPeng unveiled its new humanoid robot this year, the spectacle was designed to inspire disbelief. The robot's movements were so lifelike that company founder He Xiaopeng had to cut...
Share on Facebook Share on LinkedIn Share on X

GlassWorm Malware Targets macOS via Open VSX Extensions

A new wave of malicious extensions has been discovered in the Open VSX extension store, used by millions of developers. Koi experts warn that attackers are pushing "useful" plugins into...
Share on Facebook Share on LinkedIn Share on X

AI Job Losses: Geoffrey Hinton Warns of Widespread Unemployment by 2026

Computer science professor Geoffrey Hinton , one of the founders of modern artificial intelligence technologies, has claimed that AI could lead to large-scale job losses as early as 2026. According...
Share on Facebook Share on LinkedIn Share on X

NVIDIA Tegra X2 Vulnerability: Millions of Devices at Risk

At the 39th annual Chaos Communications Conference (39C3) , security researcher Amber Katze, 22, announced that she has completely analyzed and cracked the secure boot mechanism of the NVIDIA Tegra...
Share on Facebook Share on LinkedIn Share on X

China Regulates AI Chatbots with Human-like Interaction

Chatbots are everywhere now. We've all encountered those virtual assistants that answer our questions, provide us with information, and sometimes seem downright intelligent. But what happens when these chatbots become...
Share on Facebook Share on LinkedIn Share on X

The Dark Side of AI Rights: Why Experts Are Urging Caution

As artificial intelligence develops, the debate over its status and the limits of what is permissible is becoming increasingly heated. One of the most respected researchers in this field, Canadian...
Share on Facebook Share on LinkedIn Share on X

EU’s Child Sexual Abuse Regulation: Balancing Safety and Digital Rights

Before delving into the analysis, it is worth pointing out that this contribution is the first part of a more extensive research. In the next article, we will explore the...
Share on Facebook Share on LinkedIn Share on X

AI Systems Vulnerable to Attacks: Experts Warn of New Threats

At the recent Chaos Communication Congress in Germany, a new alarm was raised about the threats posed by artificial intelligence agents. According to cybersecurity specialist Johann Rehberger , a computer...
Share on Facebook Share on LinkedIn Share on X

China Boosts AI Education with New Strategy to Prepare Students for Digital Age

China's Ministry of Education has announced a structured strengthening of artificial intelligence education , differentiated according to different school levels, with the aim of preparing students with skills suited to...
Share on Facebook Share on LinkedIn Share on X

Finland Seizes Ship in Cable Damage Probe, Cites Security Threat

On Wednesday, December 31, Finnish authorities seized a cargo ship believed to be involved in the damage to an undersea telecommunications cable connecting Helsinki to Tallinn, Estonia. The action was...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Finland Seizes Ship in Cable Damage Probe, Cites Security Threat
Redazione RHC - 31/12/2025

On Wednesday, December 31, Finnish authorities seized a cargo ship believed to be involved in the damage to an undersea telecommunications cable connecting Helsinki to Tallinn, Estonia. The action was triggered after a technical anomaly…

Immagine del sitoCybercrime
Ransomware Attacks on the Rise: US Professionals Turn to Cybercrime
Redazione RHC - 31/12/2025

In the landscape of cybercrime investigations, some cases take on particular significance not only because of the extent of the financial damage, but also because of the profile of the individuals involved . Ransomware investigations,…

Immagine del sitoCybercrime
The Dark Side of Cybercrime: Human Costs and Consequences
Redazione RHC - 31/12/2025

By 2025, cybercrime will increasingly go beyond “just money”: attacks aren’t just about downtime bills and ransom payments , but also about real human consequences, from healthcare disruptions and victim harassment to kidnappings, torture, and…

Immagine del sitoCybercrime
OpenAI Hiring Chief Security Officer to Mitigate AI Risks
Redazione RHC - 30/12/2025

OpenAI, the developer of ChatGPT, has announced the search for a new Chief Security Officer . The position, with an annual salary of $555,000, will be directly responsible for mitigating risks associated with artificial intelligence…

Immagine del sitoCybercrime
Apple Supply Chain Hit by Cyberattack: Sensitive Data at Risk
Redazione RHC - 30/12/2025

During the first half of December, a Chinese company assembling devices for Apple was hit by an advanced cyberattack that may have exposed sensitive information related to a production line. The incident was reported by…