Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Cyber Offensive Fundamentals 970x120 V0.1

Latest news

Nvidia, Microsoft, and xAI join forces to acquire Aligned Data Centers for $40 billion Cyber News

Nvidia, Microsoft, and xAI join forces to acquire Aligned Data Centers for $40 billion

A consortium of Nvidia, Microsoft, BlackRock and xAI , the company founded by Elon Musk , announced on Wednesday an...
Redazione RHC - October 17, 2025
The era of one-handed supercomputers is upon us! GIGABYTE ATOM: A petaflop and 128GB of AI storage. Cyber News

The era of one-handed supercomputers is upon us! GIGABYTE ATOM: A petaflop and 128GB of AI storage.

On October 15, in addition to the much-vaunted NVIDIA DGX Spark solution, created in collaboration between NVIDIA and Mediatek, another...
Silvia Felici - October 16, 2025
The DGX Spark is on sale. An AI supercomputer in the palm of your hand! Cyber News

The DGX Spark is on sale. An AI supercomputer in the palm of your hand!

We talked about the DGX Spark on August 29th , but now it seems that NVIDIA has released it and...
Redazione RHC - October 16, 2025
The Poison of Curiosity and the Antidote of Cyber Hygiene: A Social Engineering Recipe Cybercrime

The Poison of Curiosity and the Antidote of Cyber Hygiene: A Social Engineering Recipe

Curiosity, that old rascal. It's the kind of thing that's been making people click links or open attachments in a...
Stefano Gazzella - October 16, 2025
Alert: Thousands of Italian websites at risk! 526,000 sites and 6,500 databases for sale on the Darkweb Cybercrime

Alert: Thousands of Italian websites at risk! 526,000 sites and 6,500 databases for sale on the Darkweb

A new post on the dark web offers full access to thousands of MySQL servers and databases owned by Italian...
Luca Stivali - October 16, 2025
F5 Suffers Security Breach: Source Code and Sensitive Data Stolen Vulnerability

F5 Suffers Security Breach: Source Code and Sensitive Data Stolen

A serious security incident has been reported by F5, a leading provider of application security and delivery solutions. A complex...
Agostino Pellegrino - October 16, 2025
Harvard University Hit by Hacking Campaign Using Oracle E-Business Suite Cyber News

Harvard University Hit by Hacking Campaign Using Oracle E-Business Suite

Harvard University has confirmed that it was hit by a recent campaign that exploited a vulnerability in Oracle's E-Business Suite...
Manuel Roccon - October 15, 2025
We’re All in the Truman Show! Cybersecurity Lessons from Seahaven Cyber Prison Cybercrime

We’re All in the Truman Show! Cybersecurity Lessons from Seahaven Cyber Prison

The 1998 film "The Truman Show" is a terrifying premonition of the dangers of pervasive surveillance, algorithmic manipulation, and the...
Daniela Farina - October 14, 2025
Microsoft warns about uncontrolled use of ‘shadow’ AI in the workplace Cyber News

Microsoft warns about uncontrolled use of ‘shadow’ AI in the workplace

While Microsoft actively promotes its Copilot tools for businesses, the company also warns of the dangers of uncontrolled use of...
Luca Vinciguerra - October 14, 2025
A PNG containing a Trojan. Astaroth persistently abuses GitHub. Vulnerability

A PNG containing a Trojan. Astaroth persistently abuses GitHub.

McAfee researchers have reported new activity by the Astaroth banking trojan , which has started using GitHub as a persistent...
Agostino Pellegrino - October 14, 2025
Internet Explorer is “dead,” but it continues to infect PCs with its bugs via Edge Cybercrime

Internet Explorer is “dead,” but it continues to infect PCs with its bugs via Edge

While Internet Explorer has officially been out of support since June 2022, Microsoft recently faced a threat that exploited Internet...
Luca Galuppi - October 14, 2025
Nanochat: Create your own LLM, train it, and get it running on your PC for $100 Cyber News

Nanochat: Create your own LLM, train it, and get it running on your PC for $100

Developer Andrej Karpathy has unveiled nanochat , a minimalist, fully open-source version of ChatGPT that can be trained and run...
Redazione RHC - October 14, 2025

ENISA takes on the role of Root in the European Cybersecurity Initiative (CVE).

The European Union Agency for Cybersecurity (ENISA) has taken on the role of Root within the Common Vulnerabilities and Exposures (CVE) programme, becoming the main point of reference for national...

Be careful when using SSDs! Without power, you risk data loss

XDA Developers reminds us that using solid-state drives for long-term storage is risky. If SSDs are left without power for years, data can become corrupted or even disappear entirely. Unlike...

Quantum Computing vs. Artificial Intelligence: Which Will Really Change the Future?

Quantum mechanics remains a complex and mysterious field, both difficult to explain and difficult to understand. This branch of physics studies the unusual behavior of tiny particles, phenomena that are...

ToddyCat APT Group Targets Microsoft 365 Email Security

Email security continues to be one of the most critical points in modern cyber attacks. While compromising a Windows domain is already a success for a malicious actor, gaining access...

WormGPT 4: AI-Powered Cybercrime Tools on the Rise

Cybercriminals no longer need to convince ChatGPT or Claude Code to write malware or data-stealing scripts. A whole class of specialized language models, specifically designed for attacks, already exists. One...

Investment Scam Alert: How to Avoid Losing Thousands

Hi everyone... my name is Marco, I'm 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of...

Trump Launches Genesis AI Mission to Revolutionize US Science

US President Donald Trump signed an executive order, " Launching the Genesis Mission," establishing a national program for the use of artificial intelligence in science. The document was published on...

Cybersecurity in the Middle East: Egitto and Qatar Lead the Way

Global attention to cybersecurity continues to grow in a context dominated by digital transformation and the rapid spread of artificial intelligence (AI) technologies, making it easier to identify vulnerabilities and...

Logitech Hit by Clop Ransomware Attack, Data Breach Exposed

Logitech representatives have notified authorities of a cyberattack and a serious data breach . The notorious Clop ransomware group, which has been targeting companies for several months by exploiting a...

Malware Uses Finger Command to Infect Windows Devices

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet,...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE