Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

970x120 Olympous
Precedente Successivo

Latest news

Crypto Malware Hacker Extradited to Korea for $1.18M Theft Cyber News

Crypto Malware Hacker Extradited to Korea for $1.18M Theft

A hacker who stole over 1.7 billion won (about $1.18 million) in cryptocurrency using malware that secretly spoofed wallet addresses...
Redazione RHC - December 31, 2025
The Dark Side of Convenience: How Digital Payments Threaten Our Privacy Cybercrime

The Dark Side of Convenience: How Digital Payments Threaten Our Privacy

Five days in London, and I felt like I was living inside a permanent demo of the future. The sleek,...
Sandro Sana - December 31, 2025
Ransomware Attacks on the Rise: US Professionals Turn to Cybercrime Cyber News

Ransomware Attacks on the Rise: US Professionals Turn to Cybercrime

In the landscape of cybercrime investigations, some cases take on particular significance not only because of the extent of the...
Pietro Melillo - December 31, 2025
Apache StreamPipes Vulnerability: Update to Prevent Admin Takeover Cyber News

Apache StreamPipes Vulnerability: Update to Prevent Admin Takeover

Apache StreamPipes is an open-source platform for real-time data analysis and processing (streaming analytics) , designed especially for IoT, Industry...
Massimiliano Brolli - December 31, 2025
The Dark Side of Cybercrime: Human Costs and Consequences Cyber News

The Dark Side of Cybercrime: Human Costs and Consequences

By 2025, cybercrime will increasingly go beyond “just money”: attacks aren’t just about downtime bills and ransom payments , but...
Stefano Gazzella - December 31, 2025
OpenAI Hiring Chief Security Officer to Mitigate AI Risks Cyber News

OpenAI Hiring Chief Security Officer to Mitigate AI Risks

OpenAI, the developer of ChatGPT, has announced the search for a new Chief Security Officer . The position, with an...
Redazione RHC - December 30, 2025

Fortinet Vulnerability: Critical FortiOS, FortiWeb, FortiProxy, FortiSwitchManager Update

A critical vulnerability affecting the FortiOS, FortiWeb, FortiProxy , and FortiSwitchManager product lines has been reported by Fortinet via an urgent security advisory. This advisory was issued in connection with...

Cybersecurity Certifications: Boost Your Career with CompTIA Security+

The cybersecurity landscape in Europe and Italy is rapidly evolving: increasing digitalization, regulations such as GDPR and NIS2, and the exponential increase in cyberattacks make it essential to invest in...

US Allows Nvidia to Sell Advanced AI Chips to China, Easing Export Restrictions

It seems the White House isn't entirely clear ... at least judging by yet another change of heart regarding the sale of Nvidia's advanced chips to China, with the Trump...

Taiwan Cracks Down on Submarine Cable Sabotage with New Laws

In recent years, Taiwan's underwater infrastructure—electricity cables, gas pipelines, and water systems—has been damaged on several occasions, particularly communications cables. On December 9, the Legislative Yuan passed a third reading...

Ransomware Attacks Decline in 2024, But Threat Remains High with $734M in Ransom

According to a recently released report by the Financial Crimes Enforcement Network (FinCEN) , global ransomware activity peaked in 2023, only to plummet in 2024. This decline is attributed to...

Embracing Vulnerability for Authentic Leadership and Team Growth

We're connected, connected to everything, hyperconnected. Our professional and social lives are dictated by extremely tight deadlines and a constantly rising bar; we must push. We tacitly demand that we...

CISA Warns: Avoid Personal VPNs for Secure Mobile Communications

In new mobile communications advisories, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a stern warning to smartphone owners : avoid using personal VPN services. The document, aimed...

Passwordless Authentication: The Future of Secure Online Access

Using passwords to access online accounts is no longer as secure as it once was. In fact, passwords are now one of the most common vulnerabilities used by cybercriminals to...

Critical PromptPwnd Vulnerability Exposes AI-Powered GitLab, GitHub Pipelines

A critical vulnerability, identified as "PromptPwnd," affects AI agents that are integrated into the GitLab CI/CD and GitHub Actions pipelines. Through this vulnerability, attackers are able to inject malicious commands...

LLM-Powered Malware: The Future of Autonomous Cyber Threats

Researchers at Netskope Threat Labs have just published a new analysis on the possibility of creating autonomous malware built exclusively from Large Language Models (LLMs), eliminating the need to encode...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE