Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

TM RedHotCyber 970x120 042543
Precedente Successivo

Latest news

Ransomware Attacks on the Rise: US Professionals Turn to Cybercrime Cyber News

Ransomware Attacks on the Rise: US Professionals Turn to Cybercrime

In the landscape of cybercrime investigations, some cases take on particular significance not only because of the extent of the...
Pietro Melillo - December 31, 2025
Apache StreamPipes Vulnerability: Update to Prevent Admin Takeover Cyber News

Apache StreamPipes Vulnerability: Update to Prevent Admin Takeover

Apache StreamPipes is an open-source platform for real-time data analysis and processing (streaming analytics) , designed especially for IoT, Industry...
Massimiliano Brolli - December 31, 2025
The Dark Side of Cybercrime: Human Costs and Consequences Cyber News

The Dark Side of Cybercrime: Human Costs and Consequences

By 2025, cybercrime will increasingly go beyond “just money”: attacks aren’t just about downtime bills and ransom payments , but...
Stefano Gazzella - December 31, 2025
OpenAI Hiring Chief Security Officer to Mitigate AI Risks Cyber News

OpenAI Hiring Chief Security Officer to Mitigate AI Risks

OpenAI, the developer of ChatGPT, has announced the search for a new Chief Security Officer . The position, with an...
Redazione RHC - December 30, 2025
Petlibro Vulnerabilities Exposed: Control Your Pet’s Safety Now Cyber News

Petlibro Vulnerabilities Exposed: Control Your Pet’s Safety Now

A series of vulnerabilities have been discovered in the popular Petlibro pet food vending ecosystem. In the worst-case scenario, these...
Agostino Pellegrino - December 30, 2025
MongoBleed Vulnerability Exploited: Update MongoDB Now to Prevent Data Breach Cyber News

MongoBleed Vulnerability Exploited: Update MongoDB Now to Prevent Data Breach

The Cybersecurity and Infrastructure Security Agency (CISA) has officially raised the alarm about a critical vulnerability in MongoDB, adding the...
Massimiliano Brolli - December 30, 2025

US Allows Nvidia to Sell Advanced AI Chips to China, Easing Export Restrictions

It seems the White House isn't entirely clear ... at least judging by yet another change of heart regarding the sale of Nvidia's advanced chips to China, with the Trump...

Taiwan Cracks Down on Submarine Cable Sabotage with New Laws

In recent years, Taiwan's underwater infrastructure—electricity cables, gas pipelines, and water systems—has been damaged on several occasions, particularly communications cables. On December 9, the Legislative Yuan passed a third reading...

Ransomware Attacks Decline in 2024, But Threat Remains High with $734M in Ransom

According to a recently released report by the Financial Crimes Enforcement Network (FinCEN) , global ransomware activity peaked in 2023, only to plummet in 2024. This decline is attributed to...

Embracing Vulnerability for Authentic Leadership and Team Growth

We're connected, connected to everything, hyperconnected. Our professional and social lives are dictated by extremely tight deadlines and a constantly rising bar; we must push. We tacitly demand that we...

CISA Warns: Avoid Personal VPNs for Secure Mobile Communications

In new mobile communications advisories, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a stern warning to smartphone owners : avoid using personal VPN services. The document, aimed...

Passwordless Authentication: The Future of Secure Online Access

Using passwords to access online accounts is no longer as secure as it once was. In fact, passwords are now one of the most common vulnerabilities used by cybercriminals to...

Critical PromptPwnd Vulnerability Exposes AI-Powered GitLab, GitHub Pipelines

A critical vulnerability, identified as "PromptPwnd," affects AI agents that are integrated into the GitLab CI/CD and GitHub Actions pipelines. Through this vulnerability, attackers are able to inject malicious commands...

LLM-Powered Malware: The Future of Autonomous Cyber Threats

Researchers at Netskope Threat Labs have just published a new analysis on the possibility of creating autonomous malware built exclusively from Large Language Models (LLMs), eliminating the need to encode...

Intellexa Exploits Zero-Day Vulnerabilities with Spyware

Despite significant geopolitical challenges, the mercenary spyware industry remains a resilient and persistent threat; in this context, the well-known vendor Intellexa continues to expand its arsenal. A recent report from...

Malaysia Cracks Down on Bitcoin Mining Thefts

Thieves usually target tangible assets: cash or non-cash, jewelry, cars. But with cryptocurrencies, things are much stranger. Malaysian police are hunting down around 14,000 illegal Bitcoin mining companies that have...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE