Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
LECS 320x100 1
Crowdstriker 970×120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

NANOREMOTE Trojan Uses Google Drive for Command and Control Cybercrime

NANOREMOTE Trojan Uses Google Drive for Command and Control

A new multifunctional Windows Trojan called NANOREMOTE uses a cloud file storage service as its command center , making the...
Redazione RHC - 12 December 2025
Microsoft Azure OAuth Attack: ConsentFix Malware Steals Accounts Cybercrime

Microsoft Azure OAuth Attack: ConsentFix Malware Steals Accounts

A new scheme called " ConsentFix " expands the capabilities of the already known ClickFix social media attack and allows...
Redazione RHC - 12 December 2025
Linux Foundation Launches Agentic AI Foundation with Key Tech Players Cybercrime

Linux Foundation Launches Agentic AI Foundation with Key Tech Players

The establishment of the Agentic AI Foundation (AAIF), a dedicated fund under the auspices of the Linux Foundation , was...
Redazione RHC - 12 December 2025
Disney Invests $1 Billion in OpenAI for Sora Video Deal Cybercrime

Disney Invests $1 Billion in OpenAI for Sora Video Deal

Disney will invest $1 billion in OpenAI and officially license its characters for use in its Sora video generator. The...
Redazione RHC - 12 December 2025
Microsoft 365 Okta Phishing Attack: Experts Warn of New Threat Cybercrime

Microsoft 365 Okta Phishing Attack: Experts Warn of New Threat

A recent study by Datadog Security Labs reveals an ongoing operation targeting organizations using Microsoft 365 and Okta for single...
Redazione RHC - 12 December 2025
React Server Components Vulnerability: Update to Prevent DoS Attacks Cybercrime

React Server Components Vulnerability: Update to Prevent DoS Attacks

The React Server component security saga continues this week. Following the patching of a critical remote code execution (RCE) vulnerability...
Redazione RHC - 12 December 2025

Inside Lazarus! The fake candidate who fooled North Korean cyber spies

A joint investigation by BCA LTD, NorthScan, and ANY.RUN has exposed one of North Korea's most secretive hacking schemes. Under the guise of routine recruitment, the team monitored how operators...
Share on Facebook Share on LinkedIn Share on X

Kawasaki CORLEO Robot Quadrupede for Human Transport by 2035

Kawasaki Heavy Industries plans to launch a quadruped robot capable of carrying humans in 2035. Kawasaki Heavy Industries announced on December 3 that it has begun production of " CORLEO...
Share on Facebook Share on LinkedIn Share on X

Candle Subsea Cable Revolutionizes Asia-Pacific Internet Connectivity

70 million simultaneous 8K videos at 570 Tbps ! This is a staggering amount of transport power in a submarine cable and will change internet access in the Asia-Pacific region....
Share on Facebook Share on LinkedIn Share on X

Google Chrome 143 Patch Fixes Critical V8 JavaScript Vulnerability

Google has released Chrome 143 for Windows, macOS, and Linux; the release contains an important patch. The new version ( 143.0.7499.40 for Linux and 143.0.7499.40/41 for Windows and macOS) addresses...
Share on Facebook Share on LinkedIn Share on X

Cybersecurity in December: How Compliance Hurries Leave Companies Vulnerable

December isn't just about Christmas lights: for those working in cybersecurity, it's the month when the human factor collapses and companies rush to buy solutions just to be "compliant" for...
Share on Facebook Share on LinkedIn Share on X

Managing AI Agents: Mitigating Security Risks in Autonomous Systems

The widespread adoption of artificial intelligence in businesses is profoundly transforming operational processes and, at the same time, introducing new security vulnerabilities . Companies are using these systems to increase...
Share on Facebook Share on LinkedIn Share on X

Mistral AI Unveils Powerful Open Source Models for Advanced AI Applications

French company Mistral AI has unveiled its Mistral 3 line of models, making them fully open source under the Apache 2.0 license . The series includes several compact and dense...
Share on Facebook Share on LinkedIn Share on X

Maha Grass APT Group Unleashes StreamSpy Malware Attacks

The Patchwork cyber espionage group — also known as Hangover or Dropping Elephant and internally tracked by QiAnXin as APT-Q-36 — has been active since 2009 and is believed to...
Share on Facebook Share on LinkedIn Share on X

Digital Crime Among Teenagers: Temporary Involvement

Dutch authorities have published data showing that adolescents' involvement in cybercrime is usually temporary. An analysis prepared by the House of Representatives indicates that early interest in hacking often fades...
Share on Facebook Share on LinkedIn Share on X

Porsche Russia Alarm Issues Spark Widespread Vehicle Immobilization

Porsche owners in Russia are increasingly experiencing problems with factory alarms, making it impossible to use their cars. Their cars won't start, stall immediately after starting, or display engine-related errors...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCulture
Long-Lived Technologies: COBOL, C, SQL, and Legacy Systems
Redazione RHC - 02/01/2026

While the industry debates which neural network is the “smartest” and which framework is the “most modern,” decades-old technologies continue to quietly swirl beneath the surface of the banking industry . This year, COBOL turned…

Immagine del sitoCybercrime
Finland Seizes Ship in Cable Damage Probe, Cites Security Threat
Redazione RHC - 31/12/2025

On Wednesday, December 31, Finnish authorities seized a cargo ship believed to be involved in the damage to an undersea telecommunications cable connecting Helsinki to Tallinn, Estonia. The action was triggered after a technical anomaly…

Immagine del sitoCybercrime
Ransomware Attacks on the Rise: US Professionals Turn to Cybercrime
Redazione RHC - 31/12/2025

In the landscape of cybercrime investigations, some cases take on particular significance not only because of the extent of the financial damage, but also because of the profile of the individuals involved . Ransomware investigations,…

Immagine del sitoCybercrime
The Dark Side of Cybercrime: Human Costs and Consequences
Redazione RHC - 31/12/2025

By 2025, cybercrime will increasingly go beyond “just money”: attacks aren’t just about downtime bills and ransom payments , but also about real human consequences, from healthcare disruptions and victim harassment to kidnappings, torture, and…

Immagine del sitoCybercrime
OpenAI Hiring Chief Security Officer to Mitigate AI Risks
Redazione RHC - 30/12/2025

OpenAI, the developer of ChatGPT, has announced the search for a new Chief Security Officer . The position, with an annual salary of $555,000, will be directly responsible for mitigating risks associated with artificial intelligence…