Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

HackTheBox 970x120 1
Precedente Successivo

CISA Warns of Spyware Attacks on Mobile Messaging Apps

An important advisory was published on Monday by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) , warning that malicious actors are actively using commercial spyware tools and remote access...

GDPR Data Breach: Email Errors and Consequences

Like it or not, sending an email to the wrong recipient constitutes a personal data breach under the GDPR. This obviously applies if the email contains personal data or if...

Ettore Accenti: The Italian Tech Pioneer Who Brought Intel to Italy

With exclusive photographs and unpublished documents: the extraordinary story of the Italian engineer who collaborated with Gordon Moore and Alan Sugar, bringing Intel to Italy and building the first tech...
Evoluzione-da-wep-a-wpa-3

The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app....

Digital Surveillance at Work: The Rise of Algorithmic Monitoring

Remote work has given employees freedom , but with it has also come digital surveillance . We discussed this some time ago in an article, reporting that these monitoring tools...

Salesforce Data Breach: ShinyHunters Hack Gainsight Integration

The growing data leak from the Salesforce ecosystem has taken a new turn after the ShinyHunters group announced its involvement in the incident. The incident has been ongoing for several...

BadAudio Discovered: Ghost Malware Used by APT24 for Three Years Undetected

Researchers at the Google Threat Intelligence Group (GTIG) have uncovered details of an espionage campaign conducted by the Chinese group APT24. This activity has been ongoing for approximately three years,...

From Risk to Resilience: How Veeam Protects Your Supply Chain from Disruptions

With the increasing digitalization of the supply chain , resilience is no longer just about logistics and suppliers, but also the security and visibility of IT systems. Disruptions are no...

Future prospects for computer science and technology graduates

Artificial intelligence is changing the way recent computer science graduates approach the world of work. It's not about sudden job disappearances , but rather a transformation of entry-level roles in...

ATMs targeted! Cybersecurity experts reveal an attack campaign targeting ATMs.

Group-IB experts presented a detailed analysis of the long-running UNC2891 campaign, which demonstrated the continuing sophistication of ATM attack schemes. Attention focused on the Raspberry Pi, which the attackers used...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE