Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Heliaca 970x120 1

Latest news

Port scanning in 2025: Nmap and AI — how to integrate them securely and operationally Cybercrime

Port scanning in 2025: Nmap and AI — how to integrate them securely and operationally

In 2025, port scanning remains a key activity for both Red Teams (reconnaissance, discovery, fingerprinting) and Blue Teams (monitoring and...
Luca Stivali - November 1, 2025
Going 50 Years Without Charging Your Phone: Here’s the Chinese Battery That Will Change Everything Cyber News

Going 50 Years Without Charging Your Phone: Here’s the Chinese Battery That Will Change Everything

Beijing-based Betavolt claims to have developed a nuclear battery that represents the world's first achievement in the miniaturization of atomic...
Silvia Felici - October 31, 2025
Linux and gaming: an increasingly reliable combination Cyber News

Linux and gaming: an increasingly reliable combination

According to Boiling Steam , the number of Windows games running reliably on Linux is the highest ever recorded. The...
Redazione RHC - October 31, 2025
Atroposia: The MaaS platform that provides a Trojan with a vulnerability scanner Cyber News

Atroposia: The MaaS platform that provides a Trojan with a vulnerability scanner

Varonis researchers have discovered the Atroposia MaaS (malware-as-a-service) platform. For $200 a month, its customers receive a remote access Trojan...
Massimiliano Brolli - October 30, 2025
0day as weapons: sold 8 US defense 0day exploits to Moscow Cyber News

0day as weapons: sold 8 US defense 0day exploits to Moscow

Peter Williams, a former employee of the defense contractor, pleaded guilty in US federal court to two counts of theft...
Agostino Pellegrino - October 30, 2025
Critical vulnerability in Blink: a website can block all Chromium-based browsers Cyber News

Critical vulnerability in Blink: a website can block all Chromium-based browsers

Researcher José Pino has presented a proof-of-concept vulnerability in the Blink rendering engine used in Chromium -based browsers, demonstrating how...
Massimiliano Brolli - October 30, 2025
Taiwan: Up to 7 years in prison for those who damage undersea cables Cyber News

Taiwan: Up to 7 years in prison for those who damage undersea cables

Taipei, October 30, 2025 – Taiwan’s Legislative Yuan Economic Commission has approved the first reading of a series of amendments...
Sandro Sana - October 30, 2025
95% of companies believe they’re ready for ransomware. But only 15% actually are! Cyber News

95% of companies believe they’re ready for ransomware. But only 15% actually are!

Companies' widespread confidence in their cyber resilience is facing a new wave of threats, this time from artificial intelligence. According...
Redazione RHC - October 30, 2025
Cyber Incident Management in the NIS2 Era Cybercrime

Cyber Incident Management in the NIS2 Era

The NIS 2 Decree (Legislative Decree 138/2024), effective October 16, 2024, implements the principles of the European NIS2 Directive, laying...
Giancarlo Di Lieto - October 30, 2025
183 million Gmail accounts hacked! But it was just a hoax Cyber News

183 million Gmail accounts hacked! But it was just a hoax

For the second time in recent months, Google has been forced to deny reports of a massive Gmail data breach...
Sandro Sana - October 29, 2025
Microsoft acquires 27% of OpenAI for $135 billion Cyber News

Microsoft acquires 27% of OpenAI for $135 billion

After nearly a year of negotiations with its longtime backer Microsoft, OpenAI has granted the latter a 27% stake ....
Redazione RHC - October 29, 2025
ClayRat: The spyware that targets Android users with self-propagation Cyber News

ClayRat: The spyware that targets Android users with self-propagation

The ClayRat spyware campaign is expanding rapidly and increasingly targeting Android users. According to Zimperium, the malware is actively spreading...
Bajram Zeqiri - October 29, 2025

Ransomware Attacks Decline in 2024, But Threat Remains High with $734M in Ransom

According to a recently released report by the Financial Crimes Enforcement Network (FinCEN) , global ransomware activity peaked in 2023, only to plummet in 2024. This decline is attributed to...

Embracing Vulnerability for Authentic Leadership and Team Growth

We're connected, connected to everything, hyperconnected. Our professional and social lives are dictated by extremely tight deadlines and a constantly rising bar; we must push. We tacitly demand that we...

CISA Warns: Avoid Personal VPNs for Secure Mobile Communications

In new mobile communications advisories, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a stern warning to smartphone owners : avoid using personal VPN services. The document, aimed...

Passwordless Authentication: The Future of Secure Online Access

Using passwords to access online accounts is no longer as secure as it once was. In fact, passwords are now one of the most common vulnerabilities used by cybercriminals to...

Critical PromptPwnd Vulnerability Exposes AI-Powered GitLab, GitHub Pipelines

A critical vulnerability, identified as "PromptPwnd," affects AI agents that are integrated into the GitLab CI/CD and GitHub Actions pipelines. Through this vulnerability, attackers are able to inject malicious commands...

LLM-Powered Malware: The Future of Autonomous Cyber Threats

Researchers at Netskope Threat Labs have just published a new analysis on the possibility of creating autonomous malware built exclusively from Large Language Models (LLMs), eliminating the need to encode...

Intellexa Exploits Zero-Day Vulnerabilities with Spyware

Despite significant geopolitical challenges, the mercenary spyware industry remains a resilient and persistent threat; in this context, the well-known vendor Intellexa continues to expand its arsenal. A recent report from...

Malaysia Cracks Down on Bitcoin Mining Thefts

Thieves usually target tangible assets: cash or non-cash, jewelry, cars. But with cryptocurrencies, things are much stranger. Malaysian police are hunting down around 14,000 illegal Bitcoin mining companies that have...

US Brothers Accused of Destroying 96 Databases with AI

The U.S. Department of Justice has accused twin brothers Muneeb and Sohaib Akhter of deleting 96 databases containing sensitive information, including investigative records and documents requested under the Freedom of...

US Seizes Phishing Site Used by Myanmar Scammers to Steal Millions

The U.S. Department of Justice has announced the shutdown of a phishing website used by scammers in Myanmar to steal thousands of dollars from victims. According to the department, the...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE