Red Hot Cyber. The Cybersecurity Blog

Cyber Security: CISA and NSA Recommend Secure Programming Languages
The main US cybersecurity agencies, CISA and NSA, have published a joint document recommending that software developers opt for programming languages considered “memory safe”. These languages are designed to provide protection against critical crashes caused by memory management errors, which

Apple and Google under pressure: German regulator wants to remove DeepSeek
Following the Italian data protection regulator, Germany’s data protection watchdog has now asked Apple and Alphabet subsidiary Google to remove the Chinese artificial intelligence (AI) startup’s DeepSeek app from their online stores due to concerns about personal data. In a

A former Australian university student has been accused of hacking Western Sydney University
New South Wales police have arrested a 27-year-old former Western Sydney University student who had repeatedly hacked into the university’s systems, including to obtain cheaper parking. Western Sydney University is one of Australia’s largest universities, offering a wide range of

Cyber War: The Invisible War in Cyberspace That Decides the Conflicts of the Present
In the heart of contemporary conflicts, alongside tanks, drones and troops, an invisible, silent and often underestimated war is being fought: cyber war. It is not just a futuristic scenario or a hypothetical threat. It is reality. From the conflicts

Skynet is coming: the malware that attacks Artificial Intelligence!
An unusual example of malicious code has been discovered in a real computing environment, which for the first time recorded an attempt to attack not classical defense mechanisms, but directly artificial intelligence systems. We are talking about the prompt injection

Cybersecurity, from NIS2 to the Cyber Resilience Act: Fortinet guides companies in compliance with the new regulatory landscape
By Aldo Di Mattia, Director of Specialized Systems Engineering and Cybersecurity Advisor Italy and Malta at Fortinet After years of defining new regulatory strategies, the regulatory landscape, particularly in Europe, is moving from the introduction of broad cybersecurity frameworks to

The Race to 0day! China Advances in Offensive Cyberpower, While the US Is Forced to Chase
Redazione RHC - June 30th, 2025
China's growing rise has prompted U.S. officials to strongly emphasize the need to improve its offensive cyber capabilities. However, some doubts remain about the ability to meet the challenge, given...

Cyberbullying and Digital Terror: Why Betti’s Comic Makes You Feel Uncomfortable (and That’s a Good Thing)
Redazione RHC - June 29th, 2025
When I decided to write this story of Betti, it was certainly not to make a “nice” or “easy” comic, to read on a sunny afternoon at the beach and...

Miniaturized Military Drone, Mosquito-Sized Model Arrives and China Offers It
Redazione RHC - June 29th, 2025
In the military sector, the trend to miniaturize drones seems to know no limits, especially when the goal is to operate without being detected. An example of this race to...

Cybersecurity, Italy on the podium with four young people. There is also Leonardo already protagonist in the RHC CTF
Redazione RHC - June 28th, 2025
The first edition of the International Cybersecurity Olympiad ended in Singapore with an excellent result for Italy. Four Italian students reached the podium, winning gold and silver medals in the...
Sign up for the newsletter