Welcome to Red Hot Cyber | Cybersecurity News
Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Crowdstrike 320×100
UtiliaCS 970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Father and son break world speed record with homemade drone

This summer, in the Dubai desert, a flight occurred that few expected to see from a battery-powered quadcopter. The experimental...
Redazione RHC - 23 November 2025

Microsoft Blocks KMS38 Activation Method for Windows 10 and 11

Users noticed that last week Microsoft developers disabled the offline activation method for Windows 11 and 10 via KMS38, which...
Redazione RHC - 23 November 2025

Future prospects for computer science and technology graduates

Artificial intelligence is changing the way recent computer science graduates approach the world of work. It's not about sudden job...
Redazione RHC - 23 November 2025

ATMs targeted! Cybersecurity experts reveal an attack campaign targeting ATMs.

Group-IB experts presented a detailed analysis of the long-running UNC2891 campaign, which demonstrated the continuing sophistication of ATM attack schemes....
Redazione RHC - 23 November 2025

Google Gemini Improves AI-Generated Image Verification

Google has expanded the capabilities of its Gemini artificial intelligence service by adding a tool to the app and web...
Redazione RHC - 23 November 2025

“We Want to Hack You Again!” NSO Group Rejects WhatsApp’s Pegasus Lawsuit

Israeli company NSO Group has appealed a California federal court ruling that bars it from using WhatsApp's infrastructure to distribute...
Redazione RHC - 22 November 2025

Father and son break world speed record with homemade drone

This summer, in the Dubai desert, a flight occurred that few expected to see from a battery-powered quadcopter. The experimental Peregreen 3 reached a speed of 360.4 miles per hour...
Facebook Linkedin X

Microsoft Blocks KMS38 Activation Method for Windows 10 and 11

Users noticed that last week Microsoft developers disabled the offline activation method for Windows 11 and 10 via KMS38, which has been used by hackers around the world for years....
Facebook Linkedin X

Future prospects for computer science and technology graduates

Artificial intelligence is changing the way recent computer science graduates approach the world of work. It's not about sudden job disappearances , but rather a transformation of entry-level roles in...
Facebook Linkedin X

ATMs targeted! Cybersecurity experts reveal an attack campaign targeting ATMs.

Group-IB experts presented a detailed analysis of the long-running UNC2891 campaign, which demonstrated the continuing sophistication of ATM attack schemes. Attention focused on the Raspberry Pi, which the attackers used...
Facebook Linkedin X

Google Gemini Improves AI-Generated Image Verification

Google has expanded the capabilities of its Gemini artificial intelligence service by adding a tool to the app and web version to check images for signs of automatic generation ....
Facebook Linkedin X

“We Want to Hack You Again!” NSO Group Rejects WhatsApp’s Pegasus Lawsuit

Israeli company NSO Group has appealed a California federal court ruling that bars it from using WhatsApp's infrastructure to distribute its Pegasus surveillance software. The case, which has been ongoing...
Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sito
TikTok Accused of Illegally Tracking Users’ Data Across Apps
Redazione RHC - 21/12/2025

The popular video app TikTok has found itself at the center of a new scandal over violations of European data protection regulations. The service has been found to track users’ activity not only within its…

Immagine del sito
Naftali Bennett Telegram Account Hacked in Israel Politics
Redazione RHC - 21/12/2025

Former Israeli Prime Minister Naftali Bennett has admitted that his Telegram account was hacked, although his device was not compromised. He made the announcement following reports of a hacked iPhone and a data leak allegedly…

Immagine del sito
Cisco Secure Email Gateway Vulnerability Exploited: Act Now
Redazione RHC - 21/12/2025

A critical zero-day flaw in Cisco Secure Email Gateway and Cisco Secure Email and Web Manager devices is causing concern among security researchers. With over 120 vulnerable devices already identified and actively exploited by attackers,…

Immagine del sito
Airbus Eyes Sovereign Cloud to Mitigate US Data Risks
Redazione RHC - 21/12/2025

In recent months, a question has been emerging with increasing insistence on European corporate boards: is the US cloud really safe for all companies? Especially for those operating in strategic sectors or with economic, industrial,…

Immagine del sito
North Korean Hackers Steal $2 Billion in Crypto, Targeting DeFi Sector
Redazione RHC - 21/12/2025

In 2025, North Korean hackers stole a record $2 billion in cryptocurrency , 51% more than the previous year. However, the number of attacks has decreased, while the damage has increased. According to Chainalysis, North…