Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

- June 27th, 2025 - (Posted in Cybercrime and Darknet)
An unusual example of malicious code has been discovered in a real computing environment, which for the first time recorded an attempt to attack not classical defense mechanisms, but directly artificial intelligence systems. We are talking about the prompt injection technique, i.e. the introduction of hidden instructions capable of compromising...
Cybercrime and Darknet

Cyber Security: CISA and NSA Recommend Secure Programming Languages

The main US cybersecurity agencies, CISA and NSA, have published a joint document recommending that software developers opt for programming languages considered “memory safe”. These languages are designed to provide protection against critical crashes caused by memory management errors, which

Cyberattacks on NFC contactless payments increase, new global threat

- June 30th, 2025

A new series of cyber attacks has been detected by ESET specialists, which sees the contactless payments sector with NFC technology as the protagonist. This type of attack was initially...

  

The Race to 0day! China Advances in Offensive Cyberpower, While the US Is Forced to Chase

- June 30th, 2025

China's growing rise has prompted U.S. officials to strongly emphasize the need to improve its offensive cyber capabilities. However, some doubts remain about the ability to meet the challenge, given...

  

Cyberbullying and Digital Terror: Why Betti’s Comic Makes You Feel Uncomfortable (and That’s a Good Thing)

- June 29th, 2025

When I decided to write this story of Betti, it was certainly not to make a “nice” or “easy” comic, to read on a sunny afternoon at the beach and...

  

Miniaturized Military Drone, Mosquito-Sized Model Arrives and China Offers It

- June 29th, 2025

In the military sector, the trend to miniaturize drones seems to know no limits, especially when the goal is to operate without being detected. An example of this race to...

  

Sign up for the newsletter