Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Red Hot Cyber Academy

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Will this latest article “against” ChatControl be absolutely useless?
Di Stefano Gazzella - 18/09/2025

We had already discussed the proposed “ChatControl” regulation almost two years ago, but given the roadmap currently underway, we find ourselves embarrassed to have to discuss it again. It feels l...

RHC interviews ShinyHunters: “Systems can be repaired, but people remain vulnerable!”
Di RHC Dark Lab - 17/09/2025

ShinyHunters is a group of threat actors that gained notoriety after the massive data breach against Salesforce, an incident that led Google to closely monitor them and assign them the code name UNC62...

The Great Firewall in the Spotlight: The Leak Revealing the Industrialization of Chinese Censorship
Di Redazione RHC - 16/09/2025

Edited by Luca Stivali and Olivia Terragni. On September 11, 2025, what can be defined as the largest leak ever suffered by the Great Firewall of China (GFW) exploded in the media, massively and massi...

OpenAI and Microsoft reach agreement to transform into a public utility company.
Di Redazione RHC - 13/09/2025

OpenAI has entered into a memorandum of understanding with Microsoft to review its partnership, which could lead to the company’s transformation into a Public Benefit Corporation (PBC). If the trans...

Goodbye PowerShell 2.0 and WMIC! The great Windows 11 cleanup has begun.
Di Redazione RHC - 12/09/2025

Windows 11 users who have installed the September 2025 Update might think that practically nothing changes. At first glance, KB5065426 looks like a normal small patch that Microsoft distributes to eve...

DeliveryRAT Trojan Alert: Hackers Steal Data and Money with Fake Apps

F6 and RuStore experts report having discovered and blocked 604 domains that were part of the infrastructure of hackers who infected mobile devices wi...
Redazione RHC - 16/09/2025 - 10:36

Plato, the cave, and social media: are we only looking at shadows?

The famous Socratic precept "Know thyself" has never been more relevant. Today, our digital identity is a fragmented mosaic of social profiles, search...
Daniela Farina - 16/09/2025 - 08:51

Vibe coding, yes, but be careful. Speed doesn’t always beat quality.

There's a new phenomenon in the programming industry: vibe coding. Developers are increasingly using artificial intelligence agents to speed up their ...
Redazione RHC - 16/09/2025 - 07:38

The Great Firewall in the Spotlight: The Leak Revealing the Industrialization of Chinese Censorship

Edited by Luca Stivali and Olivia Terragni. On September 11, 2025, what can be defined as the largest leak ever suffered by the Great Firewall of C...
Redazione RHC - 16/09/2025 - 07:21

Jaguar Land Rover cyberattack leaves $50 million in losses

The cyber attack on Jaguar Land Rover, which paralyzed the company's operations, has become one of the most serious crises for the British car manufac...
Redazione RHC - 16/09/2025 - 07:08

Microsoft accused by Ron Wyden of cybersecurity negligence

US Senator Ron Wyden sent a letter on September 10 to the Federal Trade Commission (FTC) requesting an investigation into Microsoft, accusing the comp...
Redazione RHC - 16/09/2025 - 07:04
1 3 4 5 6 7 148

DeliveryRAT Trojan Alert: Hackers Steal Data and Money with Fake Apps

- September 16th, 2025

F6 and RuStore experts report having discovered and blocked 604 domains that were part of the infrastructure of hackers who infected mobile devices with the DeliveryRAT Trojan. The malware masqueraded...

  

Plato, the cave, and social media: are we only looking at shadows?

- September 16th, 2025

The famous Socratic precept "Know thyself" has never been more relevant. Today, our digital identity is a fragmented mosaic of social profiles, search histories, and online interactions, constantly exposed and...

  

Vibe coding, yes, but be careful. Speed doesn’t always beat quality.

- September 16th, 2025

There's a new phenomenon in the programming industry: vibe coding. Developers are increasingly using artificial intelligence agents to speed up their work, but they're also encountering unpredictable problems. The stories...

  

The Great Firewall in the Spotlight: The Leak Revealing the Industrialization of Chinese Censorship

- September 16th, 2025

Edited by Luca Stivali and Olivia Terragni. On September 11, 2025, what can be defined as the largest leak ever suffered by the Great Firewall of China (GFW) exploded in...

  

Jaguar Land Rover cyberattack leaves $50 million in losses

- September 16th, 2025

The cyber attack on Jaguar Land Rover, which paralyzed the company's operations, has become one of the most serious crises for the British car manufacturer. The company was forced to...

  

Microsoft accused by Ron Wyden of cybersecurity negligence

- September 16th, 2025

US Senator Ron Wyden sent a letter on September 10 to the Federal Trade Commission (FTC) requesting an investigation into Microsoft, accusing the company of "gross negligence" in the field...

  

Sign up for the newsletter