Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

970x20 Itcentric
Precedente Successivo

Latest news

Cyber Attacks on the Rise: Wiper Malware and Data Destruction in 2025 Cyber News

Cyber Attacks on the Rise: Wiper Malware and Data Destruction in 2025

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This...
Redazione RHC - December 22, 2025
MS13-089 Ransomware: Double Extortion Without Encryption Cybercrime

MS13-089 Ransomware: Double Extortion Without Encryption

MS13-089 opens a leak site on the dark web, exposes the first data and adopts a double extortion strategy without...
Inva Malaj - December 22, 2025
OAuth Device Code Phishing: New Attack Vector for Account Takeover Cyber News

OAuth Device Code Phishing: New Attack Vector for Account Takeover

Cybercriminals are getting smarter and have found a new way to exploit corporate security protocols. It seems incredible, but it's...
Pietro Melillo - December 22, 2025
DIG AI: The Dark Web’s New AI Tool for Cybercrime Cyber News

DIG AI: The Dark Web’s New AI Tool for Cybercrime

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not...
Redazione RHC - December 21, 2025
TikTok Accused of Illegally Tracking Users’ Data Across Apps Cybercrime

TikTok Accused of Illegally Tracking Users’ Data Across Apps

The popular video app TikTok has found itself at the center of a new scandal over violations of European data...
Stefano Gazzella - December 21, 2025
Naftali Bennett Telegram Account Hacked in Israel Politics Cyber News

Naftali Bennett Telegram Account Hacked in Israel Politics

Former Israeli Prime Minister Naftali Bennett has admitted that his Telegram account was hacked, although his device was not compromised....
Redazione RHC - December 21, 2025

Be careful when using SSDs! Without power, you risk data loss

XDA Developers reminds us that using solid-state drives for long-term storage is risky. If SSDs are left without power for years, data can become corrupted or even disappear entirely. Unlike...

Quantum Computing vs. Artificial Intelligence: Which Will Really Change the Future?

Quantum mechanics remains a complex and mysterious field, both difficult to explain and difficult to understand. This branch of physics studies the unusual behavior of tiny particles, phenomena that are...

ToddyCat APT Group Targets Microsoft 365 Email Security

Email security continues to be one of the most critical points in modern cyber attacks. While compromising a Windows domain is already a success for a malicious actor, gaining access...

WormGPT 4: AI-Powered Cybercrime Tools on the Rise

Cybercriminals no longer need to convince ChatGPT or Claude Code to write malware or data-stealing scripts. A whole class of specialized language models, specifically designed for attacks, already exists. One...

Investment Scam Alert: How to Avoid Losing Thousands

Hi everyone... my name is Marco, I'm 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of...

Trump Launches Genesis AI Mission to Revolutionize US Science

US President Donald Trump signed an executive order, " Launching the Genesis Mission," establishing a national program for the use of artificial intelligence in science. The document was published on...

Cybersecurity in the Middle East: Egitto and Qatar Lead the Way

Global attention to cybersecurity continues to grow in a context dominated by digital transformation and the rapid spread of artificial intelligence (AI) technologies, making it easier to identify vulnerabilities and...

Logitech Hit by Clop Ransomware Attack, Data Breach Exposed

Logitech representatives have notified authorities of a cyberattack and a serious data breach . The notorious Clop ransomware group, which has been targeting companies for several months by exploiting a...

Malware Uses Finger Command to Infect Windows Devices

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet,...

The Future of Tech: How to Navigate the Digital World

There are books that explain technology and books that make you understand why you should pause for a minute before scrolling through a feed. Il Futuro Prossimo , Sandro Sana...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE