Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Redhotcyber Banner Sito 970x120px Uscita 101125
Precedente Successivo

Latest news

China’s Humanoid Robot Industry Booms with UBtech’s Walker S2 Cyber News

China’s Humanoid Robot Industry Booms with UBtech’s Walker S2

A video, hundreds of humanoid robots, and a reaction that went viral. When UBtech demonstrated its S2 Walkers moving in...
Redazione RHC - December 28, 2025
Cyber Criminals Recruit Insiders: Companies at Risk of Internal Threats Cyber News

Cyber Criminals Recruit Insiders: Companies at Risk of Internal Threats

The cybercriminal community is rapidly increasing its interest in recruiting personnel from within companies . Instead of sophisticated external attacks,...
Agostino Pellegrino - December 27, 2025
US Data Center Battery Dependency: A Growing Concern for AI and Defense Cyber News

US Data Center Battery Dependency: A Growing Concern for AI and Defense

In Northern Virginia, along what has come to be called the “data center corridor,” stand massive, windowless facilities that form...
Redazione RHC - December 27, 2025
Uzbekistan License Plate Surveillance System Exposed Online Cyber News

Uzbekistan License Plate Surveillance System Exposed Online

Cybersecurity specialist Anurag Sen discovered that Uzbekistan's license plate recognition system database was freely accessible online: anyone could access all...
Redazione RHC - December 27, 2025
Interpol Operation Sentinel Cracks Down on Cybercrime with 574 Arrests Cyber News

Interpol Operation Sentinel Cracks Down on Cybercrime with 574 Arrests

Interpol conducted Operation Sentinel, an international operation that resulted in the arrest of 574 people and the recovery of $3...
Agostino Pellegrino - December 27, 2025
Villager Framework: AI-Powered Penetration Testing Tool Cyber News

Villager Framework: AI-Powered Penetration Testing Tool

Straiker's AI Research (STAR) team has identified Villager, a native AI-based penetration testing framework developed by the Chinese group Cyberspike...
Redazione RHC - December 26, 2025

OSINT Investigation: Uncovering Digital Evidence

We live in an age of almost mandatory transparency, an age in which every single digital action we take, be it a simple tap on a screen, an online search,...

Europe’s Digital Sovereignty: The Risks of Relying on Non-European Tech

In recent months, two seemingly unrelated events have highlighted an uncomfortable truth: Europe no longer controls its own digital infrastructure . And this dependence, in an increasingly tense geopolitical landscape,...

Apple’s Major Shake-Up: Johny Srouji Leaves as Senior VP of Hardware Technologies

Apple is going through a period of major leadership changes , with the departure of key figures who have contributed significantly to the company's technological development. The latest executive to...

Cloudflare Outage: 25 Minutes of Chaos Due to React Server Issue

Cloudflare experienced a significant outage on the morning of December 5, 2025, when at 8:47 a.m. UTC, a portion of its infrastructure began experiencing internal errors. The incident, which lasted...

Microsoft CEO on AI Challenges

In a conversation with Matthias Döpfner, CEO of Axel Springer, Microsoft CEO Satya Nadella acknowledged that the Redmond-based company's impressive growth is currently a limiting factor in the competition in...

Pat Gelsinger on Quantum Computing Impact on AI Future

Former Intel CEO Pat Gelsinger has shared a series of assessments on the future of computing, and in particular, the evolution of artificial intelligence. In an interview with the Financial...

AI-Generated Scams: New Threats with Deepfake Photos and Videos

Criminals are increasingly using photos and videos from public sources to pass them off as evidence of an alleged kidnapping. The FBI warns that criminals are altering the images they...

Microsoft Windows LNK Vulnerability Exploited by Hackers

Experts have discovered that in the summer of 2025, Microsoft patched a dangerous vulnerability in Windows that had been actively exploited by at least 11 hacker groups, including North Korean...

Apache Tika Vulnerability CVE-2025-66516: Critical XXE Attack Risk

A critical vulnerability has been published in Apache Tika that could allow an XML external entity injection attack, known as XXE . The vulnerability, classified as CVE-2025-66516, has a CVE...

China Accuses US of Cyber Attacks, Denies Involvement in Brickstorm Malware

A spokesperson for the Chinese Embassy in Canada responded to a reporter's question about the outcry in Canada over so-called "Chinese cyber attacks." A reporter asked : Recently, the Canadian...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE