Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Redhotcyber Banner Sito 970x120px Uscita 101125
Precedente Successivo

Latest news

OAuth Device Code Phishing: New Attack Vector for Account Takeover Cyber News

OAuth Device Code Phishing: New Attack Vector for Account Takeover

Cybercriminals are getting smarter and have found a new way to exploit corporate security protocols. It seems incredible, but it's...
Pietro Melillo - December 22, 2025
DIG AI: The Dark Web’s New AI Tool for Cybercrime Cyber News

DIG AI: The Dark Web’s New AI Tool for Cybercrime

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not...
Redazione RHC - December 21, 2025
TikTok Accused of Illegally Tracking Users’ Data Across Apps Cybercrime

TikTok Accused of Illegally Tracking Users’ Data Across Apps

The popular video app TikTok has found itself at the center of a new scandal over violations of European data...
Stefano Gazzella - December 21, 2025
Naftali Bennett Telegram Account Hacked in Israel Politics Cyber News

Naftali Bennett Telegram Account Hacked in Israel Politics

Former Israeli Prime Minister Naftali Bennett has admitted that his Telegram account was hacked, although his device was not compromised....
Redazione RHC - December 21, 2025
Cisco Secure Email Gateway Vulnerability Exploited: Act Now Cyber News

Cisco Secure Email Gateway Vulnerability Exploited: Act Now

A critical zero-day flaw in Cisco Secure Email Gateway and Cisco Secure Email and Web Manager devices is causing concern...
Silvia Felici - December 21, 2025
Airbus Eyes Sovereign Cloud to Mitigate US Data Risks Cyber News

Airbus Eyes Sovereign Cloud to Mitigate US Data Risks

In recent months, a question has been emerging with increasing insistence on European corporate boards: is the US cloud really...
Redazione RHC - December 21, 2025

Bloody Wolf Attacks Central Asia with NetSupport RAT via Java Exploits

Group-IB specialists have recorded new attacks by the Bloody Wolf hacker group, which has been targeting Kyrgyzstan since June 2025 and has expanded its operations to Uzbekistan since October. The...

CEO Scam: How to Protect Your Company from Business Email Compromise

This morning, Paragon Sec was contacted by an Italian company that had been the victim of a new fraud attempt known as the CEO Scam . The accounting department received...

Shai-Hulud Worm Spreads Beyond npm, Attacks Maven

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used...

11.7% of jobs could be replaced by artificial intelligence

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable...

The market for “controlling” people is taking off on the Dark Web.

BI.ZONE experts analyzed over 3,500 advertisements on darknet platforms offering dossiers on specific individuals, known as "probiv" (finding). One in five offers (21%) promises a complete profile of an individual....

God is in the Cloud: They Hacked Your Brain and You Liked It

We're in the age of paid deception. Your every click is a private referendum in which they, the algorithms, always win. And they're never wrong: they observe you, profile you,...

Does Windows Suck? A Video by Dave Plummer, the Microsoft Engineer Who Created Task Manager

Dave Plummer, a highly regarded former senior engineer at Microsoft who led the development of several key Windows components, including Task Manager, the Windows NT port of Space Cadet Pinball...

China surpasses US in open-source AI models

China surpasses the United States in the global market for open-source artificial intelligence (AI) models. According to a November 26 Financial Times report, a study by MIT and open-source AI...

ENISA takes on the role of Root in the European Cybersecurity Initiative (CVE).

The European Union Agency for Cybersecurity (ENISA) has taken on the role of Root within the Common Vulnerabilities and Exposures (CVE) programme, becoming the main point of reference for national...

Be careful when using SSDs! Without power, you risk data loss

XDA Developers reminds us that using solid-state drives for long-term storage is risky. If SSDs are left without power for years, data can become corrupted or even disappear entirely. Unlike...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE