Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
LECS 320x100 1
LECS 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
ChatGPT buys me bread! Atlas, the smart browser for macOS, is here.
Di Redazione RHC - 22/10/2025

OpenAI has released the ChatGPT Atlas browser for macOS. It integrates artificial intelligence directly into the interface and can perform tasks on web pages without having to switch between tabs. Atl...

Immagine del sito
F5 BIG-IP Vulnerability: 266,000 Devices at Risk Worldwide! 2,500 in Italy
Di Redazione RHC - 20/10/2025

The Cybersecurity and Infrastructure Security Agency (CISA) and the Multi-State Information Sharing & Analysis Center (MS-ISAC) are issuing this Joint Cybersecurity Advisory (CSA) in response to t...

Immagine del sito
The Intel 386 processor turns 40: the 32-bit era began
Di Redazione RHC - 20/10/2025

October 20, 2025, marks a significant anniversary in the history of computing: the Intel 80386 processor, also known as the i386 , celebrates its 40th birthday . And it’s a big birthday! Launche...

Immagine del sito
Intel releases urgent patches for new Spectre variant
Di Redazione RHC - 19/10/2025

VUSec researchers have presented a paper titled “Training Solo,” which challenges the fundamental principles of protection against Spectre-v2 attacks. Previously , the domain isolation mec...

Immagine del sito
Famous hackers: Vladimir Levin and the first online bank robbery.
Di Redazione RHC - 18/10/2025

Today we’ll meet another hacker from the past. He’s Vladimir Levin, a Russian hacker from St. Petersburg (Владимир Леонидович Левин), who became famous for breaking ...

RHC’s HackerHood Reveals Two New 0days on Zyxel Products

Security researcher Alessandro Sgreccia , a member of Red Hot Cyber’s HackerHood team, has reported two new vulnerabilities to Zyxel affecting several...
Redazione RHC - 21/10/2025 - 07:36

F5 BIG-IP Vulnerability: 266,000 Devices at Risk Worldwide! 2,500 in Italy

The Cybersecurity and Infrastructure Security Agency (CISA) and the Multi-State Information Sharing & Analysis Center (MS-ISAC) are issuing this J...
Redazione RHC - 20/10/2025 - 14:44

Amazon Web Services Cloud Outage, Global Issues

A major outage in Amazon Web Services (AWS) cloud services has caused widespread connection issues around the world, affecting major platforms such as...
Redazione RHC - 20/10/2025 - 12:55

Google Announces Gemini 3.0: Artificial Intelligence Evolves Toward AGI

At the Dreamforce conference in San Francisco, Google CEO Sundar Pichai announced that Google will release a new version of its artificial intelligenc...
Redazione RHC - 20/10/2025 - 12:26

They’re Coming! Unitree Robotics Launches the H2 Destiny Awakening Humanoid

Chinese company Unitree Robotics has challenged the leadership of American robotics with the launch of its H2 "Destiny Awakening" humanoid robot. The ...
Redazione RHC - 20/10/2025 - 11:14

The Intel 386 processor turns 40: the 32-bit era began

October 20, 2025, marks a significant anniversary in the history of computing: the Intel 80386 processor, also known as the i386 , celebrates its 40th...
Redazione RHC - 20/10/2025 - 09:17

RHC’s HackerHood Reveals Two New 0days on Zyxel Products

- October 21st, 2025

Security researcher Alessandro Sgreccia , a member of Red Hot Cyber’s HackerHood team, has reported two new vulnerabilities to Zyxel affecting several devices from the ZLD (ATP/USG) family. Alessandro Sgreccia...

Facebook Linkedin X

F5 BIG-IP Vulnerability: 266,000 Devices at Risk Worldwide! 2,500 in Italy

- October 20th, 2025

The Cybersecurity and Infrastructure Security Agency (CISA) and the Multi-State Information Sharing & Analysis Center (MS-ISAC) are issuing this Joint Cybersecurity Advisory (CSA) in response to the active exploitation of...

Facebook Linkedin X

Amazon Web Services Cloud Outage, Global Issues

- October 20th, 2025

A major outage in Amazon Web Services (AWS) cloud services has caused widespread connection issues around the world, affecting major platforms such as Snapchat, Facebook, and Fortnite , along with...

Facebook Linkedin X

Google Announces Gemini 3.0: Artificial Intelligence Evolves Toward AGI

- October 20th, 2025

At the Dreamforce conference in San Francisco, Google CEO Sundar Pichai announced that Google will release a new version of its artificial intelligence, Gemini 3.0 , later this year. The...

Facebook Linkedin X

They’re Coming! Unitree Robotics Launches the H2 Destiny Awakening Humanoid

- October 20th, 2025

Chinese company Unitree Robotics has challenged the leadership of American robotics with the launch of its H2 "Destiny Awakening" humanoid robot. The robot combines a human form with surprisingly agile...

Facebook Linkedin X

The Intel 386 processor turns 40: the 32-bit era began

- October 20th, 2025

October 20, 2025, marks a significant anniversary in the history of computing: the Intel 80386 processor, also known as the i386 , celebrates its 40th birthday . And it's a...

Facebook Linkedin X
Most Read Articles of the Month Most Read Articles of the Week
  1. The Truth About Windows XP License Key: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8
  2. Computer science graduates with no future! Thousands of resumes ignored, and goodbye to six-figure salaries.
  3. With 50 dollars and physical access to the server, the Cloud goes to hell
  4. Shocking collapse: -71% of job offers for software engineers in three years
  5. Hackers hit the United States: critical federal infrastructure compromised
  1. Google Announces Gemini 3.0: Artificial Intelligence Evolves Toward AGI
  2. “Double Bind” Leads to GPT-5 Jailbreak: The AI That Was Convinced It Was Schizophrenic
  3. NIS2 and new ACN guidelines: what changes for companies and how to prepare
  4. ChatGPT writes the perfect scam… but the scammer leaves the AI instructions inside.
  5. F5 Suffers Security Breach: Source Code and Sensitive Data Stolen

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE