Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Latest news

Oracle VirtualBox Vulnerability: Risk of Virtual Machine Escape Cyber News

Oracle VirtualBox Vulnerability: Risk of Virtual Machine Escape

BI.ZONE specialists have identified two vulnerabilities (CVE-2025-62592 and CVE-2025-61760) in Oracle VirtualBox. When combined, they allowed an attacker to exit...
Massimiliano Brolli - October 26, 2025
Neolix raises $600 million for autonomous driving in urban logistics Cyber News

Neolix raises $600 million for autonomous driving in urban logistics

Chinese startup Neolix , specializing in Level 4 autonomous vehicles for urban deliveries, announced on October 23 that it has...
Redazione RHC - October 25, 2025
Supercomputing power in a refrigerator: the BIE-1 revolution Cyber News

Supercomputing power in a refrigerator: the BIE-1 revolution

On October 24, the world's first human-inspired intelligent computing system, the "BI Explorer BIE-1," was officially unveiled at the Guangdong-Macao...
Redazione RHC - October 25, 2025
AVKiller + HeartCrypt: The Combo That Opens the Door to Ransomware Cybercrime

AVKiller + HeartCrypt: The Combo That Opens the Door to Ransomware

A tool has appeared on the cybercriminal market that has quickly become a mass-produced weapon for dozens of groups. It's...
Redazione RHC - October 25, 2025
DC Comics takes a stand: “No generative AI” Cyber News

DC Comics takes a stand: “No generative AI”

DC Comics has definitively stated its position on generative AI: no machine involvement in the storytelling or illustrations . The...
Luca Vinciguerra - October 24, 2025
A “hacked” water system: hacktivism becomes digital propaganda Cyber News

A “hacked” water system: hacktivism becomes digital propaganda

In September, Forescout specialists detected a targeted attack on their honeypot server, which mimicked the control system of a water...
Bajram Zeqiri - October 24, 2025
Microsoft Edge protects Internet Explorer mode from attacks Cyber News

Microsoft Edge protects Internet Explorer mode from attacks

The Microsoft Edge security team made significant changes to Internet Explorer mode after receiving confirmation of targeted attacks using it....
Redazione RHC - October 24, 2025
Canada’s craft beer competition ends in chaos over AI judges Cyber News

Canada’s craft beer competition ends in chaos over AI judges

A major Canadian craft beer competition has become the center of controversy after unexpectedly introducing artificial intelligence into the beverage...
Silvia Felici - October 24, 2025
Russia legalizes white hat hackers with new law Cyber News

Russia legalizes white hat hackers with new law

Russia is preparing a new version of a bill legalizing white hat hackers . Two sources in government agencies and...
Redazione RHC - October 23, 2025
Azure under attack: Fake apps imitating Microsoft Teams and Azure Portal Cybercrime

Azure under attack: Fake apps imitating Microsoft Teams and Azure Portal

A new wave of digital deception has hit the Microsoft Azure ecosystem, where newly discovered vulnerabilities have allowed cybercriminals to...
Luca Galuppi - October 23, 2025
131 WhatsApp Web Chrome Extensions Used for Mass Spam Discovered Cyber News

131 WhatsApp Web Chrome Extensions Used for Mass Spam Discovered

Researchers discovered 131 extensions for automating WhatsApp Web in the official Chrome store. All were being used to send mass...
Redazione RHC - October 22, 2025
Google launches Gemini 3.0 Pro: new multimodal language model Cyber News

Google launches Gemini 3.0 Pro: new multimodal language model

Google has quietly launched Gemini 3.0 Pro , the latest development in its multimodal language model. The stated goal: to...
Redazione RHC - October 22, 2025

Anonymity for Sale: Russian SIM Card Market Thrives Amid Regulations

Efforts by legislators and law enforcement to combat money laundering and more complex SIM card verification procedures have not significantly weakened the position of anonymous number dealers. This conclusion emerges...

Microsoft Fixes Old Windows LNK Vulnerability Exploited in Attacks

Microsoft has quietly patched a long-standing Windows vulnerability that has been exploited in real-world attacks for several years. The update was released on November's Patch Tuesday, despite the company having...

Critical Vulnerability in King Addons for Elementor Exploited

During the registration process, a critical security flaw (CVE-2025-8489) in the King Addons WordPress Elementor plugin was exploited by attackers, allowing them to gain administrative privileges via a privilege escalation...

Google Discover AI Headlines: Revolutionizing News Feed or Clickbait Nightmare?

Google is testing AI-generated headlines in its Discover feed, replacing original news headlines with original ones. Sean Hollister, editor-in-chief of The Verge, reported this , noting that short and often...

Secure AI Integration in OT Systems: Key Principles and Best Practices

Since ChatGPT's public release in November 2022, artificial intelligence (AI) has been integrated into many aspects of human society. For owners and operators of critical infrastructure, AI can be used...

Kawasaki CORLEO Robot Quadrupede for Human Transport by 2035

Kawasaki Heavy Industries plans to launch a quadruped robot capable of carrying humans in 2035. Kawasaki Heavy Industries announced on December 3 that it has begun production of " CORLEO...

Google Chrome 143 Patch Fixes Critical V8 JavaScript Vulnerability

Google has released Chrome 143 for Windows, macOS, and Linux; the release contains an important patch. The new version ( 143.0.7499.40 for Linux and 143.0.7499.40/41 for Windows and macOS) addresses...

Cybersecurity in December: How Compliance Hurries Leave Companies Vulnerable

December isn't just about Christmas lights: for those working in cybersecurity, it's the month when the human factor collapses and companies rush to buy solutions just to be "compliant" for...

Managing AI Agents: Mitigating Security Risks in Autonomous Systems

The widespread adoption of artificial intelligence in businesses is profoundly transforming operational processes and, at the same time, introducing new security vulnerabilities . Companies are using these systems to increase...

Mistral AI Unveils Powerful Open Source Models for Advanced AI Applications

French company Mistral AI has unveiled its Mistral 3 line of models, making them fully open source under the Apache 2.0 license . The series includes several compact and dense...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE