Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Fortinet 970x120px

Latest news

China under surveillance: Users sanctioned for spreading fake news online Cyber News

China under surveillance: Users sanctioned for spreading fake news online

In recent months, Hainan public security authorities have launched investigations and imposed administrative sanctions against several internet users responsible for...
Redazione RHC - October 3, 2025
Criminal Hackers Target Seniors! Datzbro Arrives: Facebook and Smartphones Targeted Cyber News

Criminal Hackers Target Seniors! Datzbro Arrives: Facebook and Smartphones Targeted

A new malicious campaign is using Facebook as a vehicle to spread Datzbro , an Android malware that combines the...
Sandro Sana - October 3, 2025
100 bug researchers, $32 million! HackerOne: AI bugs are on the rise! Cyber News

100 bug researchers, $32 million! HackerOne: AI bugs are on the rise!

Vulnerability bounty platform HackerOne reported that white hat hackers worldwide received $81 million in compensation over the past 12 months....
Agostino Pellegrino - October 3, 2025
Beyond the Screen: The Postal Police Event for a Healthy Life Beyond Social Media Cybercrime

Beyond the Screen: The Postal Police Event for a Healthy Life Beyond Social Media

The Red Hot Cyber Community had the opportunity to participate in "Beyond the Screen," the Postal Police's important initiative for...
Marcello Filacchioni - October 3, 2025
They’re offering you €55,000 for access to your office account. What should you do? Cyber News

They’re offering you €55,000 for access to your office account. What should you do?

BBC journalist Joe Tidy found himself in a situation usually hidden in the shadows of cybercrime. In July, he received...
Redazione RHC - October 3, 2025
Work and artificial intelligence: rising salaries for those who use AI? Cyber News

Work and artificial intelligence: rising salaries for those who use AI?

The debate over artificial intelligence applied to the world of work is currently intensifying, a clear sign of how digital...
Luca Vinciguerra - October 3, 2025
Klopatra Arrives! The Banking Trojan That Threatens Android Users Cyber News

Klopatra Arrives! The Banking Trojan That Threatens Android Users

An Android banking Trojan and RAT called Klopatra masquerades as an IPTV and VPN app and has already infected over...
Redazione RHC - October 2, 2025
Data Act: Yet another regulation? Yes. But this one really changes the game (even for those in security). Cybercrime

Data Act: Yet another regulation? Yes. But this one really changes the game (even for those in security).

Every time Brussels churns out a new acronym, someone in the company snorts: "More paper?" It happens. But the Data...
Sandro Sana - October 2, 2025
Google Drive defends itself from ransomware! AI blocks attacks Cyber News

Google Drive defends itself from ransomware! AI blocks attacks

Google has unveiled a new AI tool for Drive for desktop. The model is said to have been trained on...
Redazione RHC - October 2, 2025
Microsoft Outlook is in chaos: the Windows client crashes and blocks mailboxes. Cyber News

Microsoft Outlook is in chaos: the Windows client crashes and blocks mailboxes.

Microsoft has announced that it is investigating a significant issue with the traditional Outlook desktop client for the Windows operating...
Redazione RHC - October 2, 2025
Can a camera read your mind? The answer comes from Portugal. Cyber News

Can a camera read your mind? The answer comes from Portugal.

A study conducted at the Champalimode Foundation in Portugal has shown that a simple video recording is enough to "peek"...
Redazione RHC - October 2, 2025
China mandates AI content labels. Let’s see what’s happening. Cyber News

China mandates AI content labels. Let’s see what’s happening.

Starting September 1, 2025, all artificial intelligence (AI)-generated content in China must be marked with an "electronic watermark," according to...
Redazione RHC - October 2, 2025

Shakerati Anonimi: Nicoletta’s experience and the credit card thriller

The room is the same: dim lights, chairs in a circle, thermoses of herbal teas now cold from all the talking and venting. We are Shakerati Anonimi , a group...

Apple ordered to pay $634 million to Masimo for patent infringement

Masimo, an American company that develops medical monitoring technologies, has won another round of litigation with Apple . A federal jury awarded it $634 million for infringing a patent on...

Microsoft Azure blocks a 15.72 terabit per second DDoS attack

A massive DDoS attack was neutralized by Microsoft Azure on October 24. A single endpoint located in Australia was targeted by the attack, which reached a maximum speed of 15.72...

Real World and Fictional World: A Psychological and Philosophical Analysis of the 1999 Film The Matrix by Lana and Lilly Wachowski

We've said too many times that nowadays, social networks have become an integral part of our daily lives: it's now natural to contact an acquaintance with a WhatsApp message, post...

The phenomenon of polarization on the internet: Hikikomori

Many still maintain that hikikomori is an exclusively Japanese phenomenon. Yet, scientifically, numerous studies now confirm the existence of cases similar in characteristics to Japanese hikikomori in Spain, France, Italy,...

From Likes to Depression: How Social Media Can Affect Our Mental Health

Questioning changes as they occur is always a difficult, if not downright foolhardy, undertaking. Certainly, when the object of the investigation concerns the changes social media has wrought on individuals,...

The US and Global Surveillance: Uncovering Section 702 of the Foreign Intelligence Surveillance Act

Privacy in the United States is a constant topic of debate, especially in the digital age. The Supreme Court has played a central role in interpreting the Fourth Amendment, which...

What is Cross-Site Scripting? An article to help you understand it in a simple way.

Author : Davide Cavallini Today I will try to use the same dialectic ( as previously done in the article on SQL injection ), and explain in a simple way...

Spy Apps: How Spyware Works and Why It’s a Privacy Risk

Spyware (also known as spy apps) represent one of the most insidious and dangerous threats of the digital age. These are malicious programs designed to infiltrate a user's device, collecting...

Nuclear power entirely in the hands of AI! And what if there’s an accident?

In the technological field, the idea that the future development of generating systems depends inexorably on the expansion of nuclear capacity is taking root, pushing the sector's players to identify...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE