Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

970x20 Itcentric

Latest news

Oracle Critical Patch Update October 2025: 374 vulnerabilities fixed Cyber News

Oracle Critical Patch Update October 2025: 374 vulnerabilities fixed

Oracle has released its new quarterly security update, the October 2025 Critical Patch Update , which addresses 374 vulnerabilities identified...
Massimiliano Brolli - October 22, 2025
China launches UBIOS, the first national standard for system firmware. Cyber News

China launches UBIOS, the first national standard for system firmware.

The Global Computing Consortium (GCC) officially announced the release of the group standard " Uniform Basic Input/Output System (UBIOS) Infrastructure...
Silvia Felici - October 22, 2025
Visual Studio Code under attack: GlassWorm worm spreads via extensions Cyber News

Visual Studio Code under attack: GlassWorm worm spreads via extensions

Researchers at Koi Security have detected a supply chain attack using OpenVSX and the Visual Studio Code Marketplace . Criminal...
Sandro Sana - October 21, 2025
In-depth analysis! Your toilet now knows you better than your GP. Cyber News

In-depth analysis! Your toilet now knows you better than your GP.

Kohler enters the digital health market with an unusual product: a toilet-mounted module equipped with a camera and a recognition...
Redazione RHC - October 21, 2025
Data Anonymization: Protecting Privacy Without Losing Utility Cybercrime

Data Anonymization: Protecting Privacy Without Losing Utility

In an era where personal data is being produced and shared on a massive, daily basis, the concept of anonymization...
Aniello Giugliano - October 21, 2025
Google Announces Gemini 3.0: Artificial Intelligence Evolves Toward AGI Cyber News

Google Announces Gemini 3.0: Artificial Intelligence Evolves Toward AGI

At the Dreamforce conference in San Francisco, Google CEO Sundar Pichai announced that Google will release a new version of...
Luca Vinciguerra - October 20, 2025
They’re Coming! Unitree Robotics Launches the H2 Destiny Awakening Humanoid Cyber News

They’re Coming! Unitree Robotics Launches the H2 Destiny Awakening Humanoid

Chinese company Unitree Robotics has challenged the leadership of American robotics with the launch of its H2 "Destiny Awakening" humanoid...
Redazione RHC - October 20, 2025
Lancelot, the secure federated learning system Cyber News

Lancelot, the secure federated learning system

A team of researchers in Hong Kong has released a system called Lancelot, which represents the first practical implementation of...
Redazione RHC - October 20, 2025
FlorentIA: A Look at Artificial Intelligence in the Heart of Florence Cybercrime

FlorentIA: A Look at Artificial Intelligence in the Heart of Florence

At the beginning of this month, Florence hosted a unique event on October 1st: FlorentIA . FlorentIA presents itself as...
Nicola Tarlini - October 20, 2025
Critical vulnerability in Linux-PAM: Privilege escalation with CVE-2025-8941 Cyber News

Critical vulnerability in Linux-PAM: Privilege escalation with CVE-2025-8941

A high-severity vulnerability has been identified in the Pluggable Authentication Modules (PAM) framework with the identifier CVE-2025-8941. This vulnerability originates...
Massimiliano Brolli - October 19, 2025
Boris Johnson is enthusiastic about AI: he uses ChatGPT for his books. Cyber News

Boris Johnson is enthusiastic about AI: he uses ChatGPT for his books.

Former British Prime Minister Boris Johnson has expressed his enthusiasm for artificial intelligence, revealing in an interview that he uses...
Luca Vinciguerra - October 19, 2025
Blockchain at risk! The quantum threat is a race against time Cyber News

Blockchain at risk! The quantum threat is a race against time

The race for quantum supremacy is turning into a race for cryptocurrency survival . If quantum computers reach the promised...
Redazione RHC - October 19, 2025

Digital Crime Among Teenagers: Temporary Involvement

Dutch authorities have published data showing that adolescents' involvement in cybercrime is usually temporary. An analysis prepared by the House of Representatives indicates that early interest in hacking often fades...

Porsche Russia Alarm Issues Spark Widespread Vehicle Immobilization

Porsche owners in Russia are increasingly experiencing problems with factory alarms, making it impossible to use their cars. Their cars won't start, stall immediately after starting, or display engine-related errors...

ShadyPanda Malware Infects 4.3M Browsers with Chrome Edge Extensions

Researchers at Koi Security described a multi-stage operation called ShadyPanda . Over the course of seven years, attackers released seemingly useful extensions for Chrome and Edge, built up an audience...

The Dark Side of Internet Control: Durov’s Warning

Post 462 on Durov's official channel immediately went into “scream mode”: “ The end of the free internet. The free internet is becoming a tool of control .” No birthday...

Brazilian Systems Targeted in Sophisticated OAST Exploit Campaign

Security researchers have discovered a sophisticated exploit campaign that leverages a private out-of-band application security testing (OAST) service hosted on Google Cloud infrastructure. The campaign primarily targets systems in Brazil...

Australian Man Jailed for Evil Twin Wi-Fi Scam Targeting Airline Passengers

An Australian court has convicted a 44-year-old man who stole the personal data of airline passengers and airport visitors over several months . He was sentenced to seven years and...

KrakenBite Phishing Service Exposed

The underground cybercrime market continues to evolve rapidly, fueled by specialized groups designing and selling tools for increasingly sophisticated digital scams. Among these, a particularly active player in recent weeks...

ADC Aerospace Hit by Play Ransomware Attack, Data Breach Feared

American aviation and defense components manufacturer ADC Aerospace has found itself in the spotlight due to a possible cyber attack by the Play ransomware group, which appeared on their blog...

Microsoft 365 Security Risk: Interface Poisoning Attacks

This article analyzes the disclosure submitted to Microsoft and available in English on digitaldefense , where images, demonstration videos and a Python code example are available. In recent years, digital...

Calendar Subscriptions: A Hidden Danger in Your Digital Life

Digital calendars have long been a convenient way to keep track of daily activities, but new research from Bitsight shows that this familiar tool can become a real attack channel....

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE