Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

UtiliaCS 970x120

Latest news

From image theft to deepfakes: the new frontier of digital manipulation Cybercrime

From image theft to deepfakes: the new frontier of digital manipulation

In recent months, I've repeatedly found myself filing complaints about fake videos circulating online. We're not just talking about stolen...
Paolo Galdieri - September 15, 2025
The ChillyHell backdoor returns to threaten macOS systems. Cyber News

The ChillyHell backdoor returns to threaten macOS systems.

Researchers have reported a new surge in activity for ChillyHell, a modular backdoor for macOS that was thought to be...
Redazione RHC - September 15, 2025
Regulating out-of-office work: a best practice for organizations and beyond. Culture

Regulating out-of-office work: a best practice for organizations and beyond.

When talking about information security, we must first take a breath and realize that we need to dive deeper than...
Stefano Gazzella - September 15, 2025
Apple introduces Memory Integrity Enforcement. Will this be the end of hacking? Cyber News

Apple introduces Memory Integrity Enforcement. Will this be the end of hacking?

Apple officially introduced Memory Integrity Enforcement, a new memory protection system that the company calls the most significant advancement ever...
Manuel Roccon - September 15, 2025
Happy Birthday, Super Mario Bros.! 40 years of a game that revolutionized the world. Cyber News

Happy Birthday, Super Mario Bros.! 40 years of a game that revolutionized the world.

It's been exactly four decades since the release of the legendary Super Mario Bros., a project that changed the video...
Redazione RHC - September 14, 2025
China Makes Historic Turn: Mandatory Labeling of AI-Created Content Cyber News

China Makes Historic Turn: Mandatory Labeling of AI-Created Content

A series of Chinese national standards came into force on September 1st, aimed at redefining rules, responsibilities, and controls in...
Redazione RHC - September 14, 2025
Attention seniors! Ruthless hacker scam: Criminal hackers steal your life savings. Cyber News

Attention seniors! Ruthless hacker scam: Criminal hackers steal your life savings.

According to the New York State Attorney General's Office, the primary target of criminal hackers is the elderly and those...
Marcello Filacchioni - September 13, 2025
Quantum algorithm solves complex mathematical problem Cyber News

Quantum algorithm solves complex mathematical problem

Researchers have used a quantum algorithm for the first time to solve a complex mathematical problem that for over a...
Redazione RHC - September 13, 2025
Sentenced to 4.5 years for piracy: he sold DVDs and films online. Cyber News

Sentenced to 4.5 years for piracy: he sold DVDs and films online.

A U.S. court sentenced a Memphis resident to four and a half years in prison for selling digital copies of...
Redazione RHC - September 13, 2025
Samsung releases September 2025 security patch, fixing critical vulnerabilities. Vulnerability

Samsung releases September 2025 security patch, fixing critical vulnerabilities.

A September 2025 security update has been released by Samsung to address a critical zero-day vulnerability that is currently being...
Agostino Pellegrino - September 13, 2025
Villager: The Kali Linux and DeepSeek Attack Tool That’s Alarming Experts Cyber News

Villager: The Kali Linux and DeepSeek Attack Tool That’s Alarming Experts

The experts at Straiker have announced a new tool called Villager, which has been downloaded nearly 10,000 times from the...
Redazione RHC - September 13, 2025
Italy among the spyware giants! A solid third place after Israel and the US. Cyber News

Italy among the spyware giants! A solid third place after Israel and the US.

We're not exactly great at cybersecurity, but we're top of the class when it comes to spyware! According to an...
Bajram Zeqiri - September 12, 2025

The most used password in 2025? It’s still “123456”! Humanity never learns.

In 2025, users still rely heavily on basic passwords to protect their accounts. A Comparitech study, based on an analysis of over 2 billion real passwords leaked to data breach...

Russian Sandworm hackers target Ukrainian grain industry with wiper malware

Russian Sandworm hackers use wiper malware against the Ukrainian grain industry. Ukraine's grain industry has become the latest target of the infamous, state-backed Russian hacking unit Sandworm, as part of...

Highly advanced, adaptive malware uses AI to confuse security defenses

Based on a recent analysis by the Google Threat Intelligence Group (GTIG), a shift has been identified among threat actors over the past year. Continuous improvements in the underground for...

An AI extension for VS Code turns your PC into a digital hostage

Secure Annex researchers found a malicious extension in the Visual Studio Code Marketplace extension catalog for VS Code that features basic ransomware functionality. The malware was apparently written using Vibe...

The Louvre’s security myth crumbles! Between audits, ridiculous passwords, and outdated cameras.

The recent theft at the Louvre Museum, located in the heart of Paris, has shocked not only the art world but also the cybersecurity world. On the night of October...

Double-dealing: employees of a company that resolved ransomware attacks were launching them themselves

Three former DigitalMint employees, who investigated ransomware incidents and negotiated with ransomware groups, are accused of hacking into the networks of five American companies. According to the U.S. Department of...

Cybersecurity is democratic: the same virus hits multinationals and housewives

The same malware that yesterday blocked the servers of a major bank today encrypts Mrs. Pina's photos on her home PC. As? With an innocuous WhatsApp message, sent by his...

Microsoft apologizes to 3 million Australian users for unfair business practices

Microsoft has apologised to nearly 3 million Australian users and offered them refunds for subscriptions to its new, more expensive Microsoft 365 office suite , which includes Copilot, an AI-powered...

Cisco Addresses Critical Vulnerabilities in ASA and Unified Contact Center Express

Cisco recently announced the discovery of a new type of cyberattack aimed at compromising devices running Cisco Secure Firewall Adaptive Security Appliance (ASA) and Cisco Secure Firewall Threat Defense (FTD)...

Rust Rebels! Fund Launched to Pay Open Source Maintainers

The Rust Foundation has announced the launch of the Maintainers Fund, a new program designed to support developers responsible for the stability and development of the Rust ecosystem. This step...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE