Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Redhotcyber Banner Sito 970x120px Uscita 101125

Latest news

The 6 Best Hacker Girls of All Time Cyber News

The 6 Best Hacker Girls of All Time

We often talk about hacking, hackers, cybercrime, black, gray, and white. But is "hacker" always synonymous with the male gender?...
Sandro Sana - October 18, 2025
Famous hackers: Albert Gonzalez, called Soupnazi Cyber News

Famous hackers: Albert Gonzalez, called Soupnazi

Born to Cuban parents in 1981, Albert Gonzalez attended South Miami High School in Miami, Florida. He was accused of...
Silvia Felici - October 18, 2025
The most famous female hackers ever: Kimberley Vanvaeck aka Gigabyte. Cybercrime

The most famous female hackers ever: Kimberley Vanvaeck aka Gigabyte.

Gigabyte is the pseudonym of Kimberley Vanvaeck, a Belgian hacker known for writing numerous high-end malware, as well as for...
Silvia Felici - October 18, 2025
The Most Famous Hacker Girls Ever: Kristina Svechinskaya Cyber News

The Most Famous Hacker Girls Ever: Kristina Svechinskaya

In the collective imagination, the word "hacker" or "computer criminal" is a young man with enormous computer skills, but history...
Silvia Felici - October 18, 2025
Famous Hackers: The Story of Adrian Lamo Cybercrime

Famous Hackers: The Story of Adrian Lamo

Adrian Lamo was a hacker who found new ways to breach companies and make them realize how insecure they were....
Silvia Felici - October 18, 2025
Lenovo launches the ThinkBook Plus G6 Rollable 2025 with a rollable display. Cyber News

Lenovo launches the ThinkBook Plus G6 Rollable 2025 with a rollable display.

Tech giant Lenovo has officially started selling the ThinkBook Plus G6 Rollable 2025 , the world's first laptop with a...
Redazione RHC - October 18, 2025
Using a VPN to watch adult content? It’ll be a crime in Wisconsin. Cyber News

Using a VPN to watch adult content? It’ll be a crime in Wisconsin.

Wisconsin authorities have decided to go further than most other US states in promoting mandatory age verification for accessing adult...
Redazione RHC - October 18, 2025
Pasquale’s Experience: A Text Message in the Heat – Session 1 Cybercrime

Pasquale’s Experience: A Text Message in the Heat – Session 1

Cybercrime is increasingly looming over the unfortunate online world. Fake profiles and scams are rampant on social networks, which, even...
Massimiliano Brolli - October 18, 2025
Inside IEEE 802.11 Wireless Networks: Wi-Fi Architecture and Signaling Cybercrime

Inside IEEE 802.11 Wireless Networks: Wi-Fi Architecture and Signaling

IEEE 802.11 wireless networks, better known as Wi-Fi, are the beating heart of modern connectivity. From a niche solution for...
Vincenzo Miccoli - October 18, 2025
Problems with localhost on Windows 11 after October updates Cyber News

Problems with localhost on Windows 11 after October updates

The October updates for Windows 11 broke localhost functionality, preventing applications connecting to 127.0.0.1 over HTTP/2 from working properly. While...
Redazione RHC - October 18, 2025
“Yuheng,” the microchip that captures the spectra of 10,000 stars per second Cyber News

“Yuheng,” the microchip that captures the spectra of 10,000 stars per second

A team led by Professor Fang Lu from the Department of Electrical Engineering at Tsinghua University has announced the development...
Redazione RHC - October 17, 2025
Microsoft blocks Vanilla Tempest: Fake Teams installers spread Rhysida ransomware Cyber News

Microsoft blocks Vanilla Tempest: Fake Teams installers spread Rhysida ransomware

In early October 2025, Microsoft stopped a large malicious operation attributed to the Vanilla Tempest group, revoking more than 200...
Redazione RHC - October 17, 2025

Airbus A320 Recall Due to ELAC System Failure Caused by Solar Flares

Airbus has announced the recall of approximately 6,500 A320 aircraft due to potential failures in the ELAC control system caused by powerful solar flares. The recall followed a sudden loss...

Leonardo’s Michelangelo Dome: AI-Powered Defense Against Hypersonic Threats

Italian defense company Leonardo has unveiled its new Michelangelo Dome system . According to the company, it is designed to counter hypersonic missiles and mass drone attacks . During the...

Windows 11 Password Issue: Microsoft Warns of Invisible Icon Bug

Microsoft has warned users of a Windows 11 glitch: after the release of updates starting in August 2025 , the password-based sign-in button may disappear from the lock screen. While...

The Power of A* Algorithm in Artificial Intelligence and Robotics

Nearly everything artificial intelligence does today is based on a simple but fundamental idea: any problem can be reduced to finding a path from a starting point to a goal....

ChatGPT to Introduce Targeted Ads, Changing Monetization Strategy

Until now, ChatGPT has been ad-free: no banners, no hidden promotions. Even the paid versions worked without pushy offers. But that could change soon. As reported by user X (formerly...

Bloody Wolf Attacks Central Asia with NetSupport RAT via Java Exploits

Group-IB specialists have recorded new attacks by the Bloody Wolf hacker group, which has been targeting Kyrgyzstan since June 2025 and has expanded its operations to Uzbekistan since October. The...

CEO Scam: How to Protect Your Company from Business Email Compromise

This morning, Paragon Sec was contacted by an Italian company that had been the victim of a new fraud attempt known as the CEO Scam . The accounting department received...

Shai-Hulud Worm Spreads Beyond npm, Attacks Maven

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used...

The market for “controlling” people is taking off on the Dark Web.

BI.ZONE experts analyzed over 3,500 advertisements on darknet platforms offering dossiers on specific individuals, known as "probiv" (finding). One in five offers (21%) promises a complete profile of an individual....

God is in the Cloud: They Hacked Your Brain and You Liked It

We're in the age of paid deception. Your every click is a private referendum in which they, the algorithms, always win. And they're never wrong: they observe you, profile you,...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE