Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Fortinet 320x100px
Crowdstriker 970×120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

LLM-Powered Malware: The Future of Autonomous Cyber Threats Cybercrime

LLM-Powered Malware: The Future of Autonomous Cyber Threats

Researchers at Netskope Threat Labs have just published a new analysis on the possibility of creating autonomous malware built exclusively...
Redazione RHC - 9 December 2025
Intellexa Exploits Zero-Day Vulnerabilities with Spyware Cybercrime

Intellexa Exploits Zero-Day Vulnerabilities with Spyware

Despite significant geopolitical challenges, the mercenary spyware industry remains a resilient and persistent threat; in this context, the well-known vendor...
Redazione RHC - 8 December 2025
Malaysia Cracks Down on Bitcoin Mining Thefts Cybercrime

Malaysia Cracks Down on Bitcoin Mining Thefts

Thieves usually target tangible assets: cash or non-cash, jewelry, cars. But with cryptocurrencies, things are much stranger. Malaysian police are...
Redazione RHC - 8 December 2025
Australia Bans Social Media for Under 16s: What You Need to Know Cybercrime

Australia Bans Social Media for Under 16s: What You Need to Know

Australia is soon to introduce groundbreaking legislation banning social media access for children under 16, an initiative that will set...
Redazione RHC - 8 December 2025
Palo Alto Networks VPN Vulnerability Exploited by Hackers Cybercrime

Palo Alto Networks VPN Vulnerability Exploited by Hackers

An increasingly aggressive campaign, directly targeting remote access infrastructure, has prompted threat actors to actively attempt to exploit vulnerabilities in...
Redazione RHC - 8 December 2025
US Brothers Accused of Destroying 96 Databases with AI Cybercrime

US Brothers Accused of Destroying 96 Databases with AI

The U.S. Department of Justice has accused twin brothers Muneeb and Sohaib Akhter of deleting 96 databases containing sensitive information,...
Redazione RHC - 8 December 2025

WormGPT 4: AI-Powered Cybercrime Tools on the Rise

Cybercriminals no longer need to convince ChatGPT or Claude Code to write malware or data-stealing scripts. A whole class of specialized language models, specifically designed for attacks, already exists. One...
Share on Facebook Share on LinkedIn Share on X

EU lawmakers push for Microsoft alternative to boost tech sovereignty

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns...
Share on Facebook Share on LinkedIn Share on X

Investment Scam Alert: How to Avoid Losing Thousands

Hi everyone... my name is Marco, I'm 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of...
Share on Facebook Share on LinkedIn Share on X

Trump Launches Genesis AI Mission to Revolutionize US Science

US President Donald Trump signed an executive order, " Launching the Genesis Mission," establishing a national program for the use of artificial intelligence in science. The document was published on...
Share on Facebook Share on LinkedIn Share on X

Cybersecurity in the Middle East: Egitto and Qatar Lead the Way

Global attention to cybersecurity continues to grow in a context dominated by digital transformation and the rapid spread of artificial intelligence (AI) technologies, making it easier to identify vulnerabilities and...
Share on Facebook Share on LinkedIn Share on X

US States Crack Down on VPNs and Online Privacy for Minors

Several U.S. states are debating new restrictions that could significantly change traditional approaches to online privacy . Legislators in Wisconsin and Michigan are considering initiatives to combat material deemed harmful...
Share on Facebook Share on LinkedIn Share on X

Logitech Hit by Clop Ransomware Attack, Data Breach Exposed

Logitech representatives have notified authorities of a cyberattack and a serious data breach . The notorious Clop ransomware group, which has been targeting companies for several months by exploiting a...
Share on Facebook Share on LinkedIn Share on X

Malware Uses Finger Command to Infect Windows Devices

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet,...
Share on Facebook Share on LinkedIn Share on X

The Future of Tech: How to Navigate the Digital World

There are books that explain technology and books that make you understand why you should pause for a minute before scrolling through a feed. Il Futuro Prossimo , Sandro Sana...
Share on Facebook Share on LinkedIn Share on X

Google Gemini 3.0 Shakes Nvidia’s AI Dominance with TPU Innovation

Nvidia's dominance in the artificial intelligence (AI) sector was shaken by the acclaim for Google's "Gemini 3.0." Nvidia's stock price fell more than 2% in after-hours trading. SK Hynix, a...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Finland Seizes Ship in Cable Damage Probe, Cites Security Threat
Redazione RHC - 31/12/2025

On Wednesday, December 31, Finnish authorities seized a cargo ship believed to be involved in the damage to an undersea telecommunications cable connecting Helsinki to Tallinn, Estonia. The action was triggered after a technical anomaly…

Immagine del sitoCybercrime
Ransomware Attacks on the Rise: US Professionals Turn to Cybercrime
Redazione RHC - 31/12/2025

In the landscape of cybercrime investigations, some cases take on particular significance not only because of the extent of the financial damage, but also because of the profile of the individuals involved . Ransomware investigations,…

Immagine del sitoCybercrime
The Dark Side of Cybercrime: Human Costs and Consequences
Redazione RHC - 31/12/2025

By 2025, cybercrime will increasingly go beyond “just money”: attacks aren’t just about downtime bills and ransom payments , but also about real human consequences, from healthcare disruptions and victim harassment to kidnappings, torture, and…

Immagine del sitoCybercrime
OpenAI Hiring Chief Security Officer to Mitigate AI Risks
Redazione RHC - 30/12/2025

OpenAI, the developer of ChatGPT, has announced the search for a new Chief Security Officer . The position, with an annual salary of $555,000, will be directly responsible for mitigating risks associated with artificial intelligence…

Immagine del sitoCybercrime
Apple Supply Chain Hit by Cyberattack: Sensitive Data at Risk
Redazione RHC - 30/12/2025

During the first half of December, a Chinese company assembling devices for Apple was hit by an advanced cyberattack that may have exposed sensitive information related to a production line. The incident was reported by…