Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

UtiliaCS 970x120
Precedente Successivo

Latest news

E-Note Shutdown: Major Blow to Cybercrime and Ransomware Cybercrime

E-Note Shutdown: Major Blow to Cybercrime and Ransomware

When we talk about cybercrime, we often think of something far away, something that doesn't concern us. But the truth...
Marcello Filacchioni - December 19, 2025
French Police Arrest Suspect in Cyberattack on Interior Ministry Cyber News

French Police Arrest Suspect in Cyberattack on Interior Ministry

French law enforcement has arrested a 22-year-old man suspected of carrying out a recent cyberattack on the Ministry of the...
Agostino Pellegrino - December 18, 2025
Google Unveils Gemini 3 Flash AI Model, Rivals OpenAI GPT-5.2 Cyber News

Google Unveils Gemini 3 Flash AI Model, Rivals OpenAI GPT-5.2

The battle for AI leadership is increasingly moving from the lab to mass production. The day after the release of...
Redazione RHC - December 18, 2025
Rise of AI Degrees: Students Shift from Computer Science to AI Cyber News

Rise of AI Degrees: Students Shift from Computer Science to AI

A marked shift in college student preferences is taking place in the United States. More and more young people are...
Redazione RHC - December 18, 2025
SonicWall SMA1000 Vulnerability: Critical Security Patch Released Vulnerability

SonicWall SMA1000 Vulnerability: Critical Security Patch Released

Researchers have discovered a vulnerability, identified as CVE-2025-40602, affecting SonicWall's SMA1000 series of secure access gateways. This flaw is particularly...
Agostino Pellegrino - December 18, 2025
HPE OneView Vulnerability CVE-2025-37164: Critical Security Update Required Vulnerability

HPE OneView Vulnerability CVE-2025-37164: Critical Security Update Required

Cybersecurity is a serious issue, especially when it comes to vulnerabilities that can compromise an entire system. Well, Hewlett Packard...
Agostino Pellegrino - December 18, 2025

Does Windows Suck? A Video by Dave Plummer, the Microsoft Engineer Who Created Task Manager

Dave Plummer, a highly regarded former senior engineer at Microsoft who led the development of several key Windows components, including Task Manager, the Windows NT port of Space Cadet Pinball...

China surpasses US in open-source AI models

China surpasses the United States in the global market for open-source artificial intelligence (AI) models. According to a November 26 Financial Times report, a study by MIT and open-source AI...

ENISA takes on the role of Root in the European Cybersecurity Initiative (CVE).

The European Union Agency for Cybersecurity (ENISA) has taken on the role of Root within the Common Vulnerabilities and Exposures (CVE) programme, becoming the main point of reference for national...

Supply Chain Attack on OpenAI: Analytics Provider Mixpanel Compromised

OpenAI has confirmed a security incident at Mixpanel, a third-party analytics provider used for its APIs. According to the investigation, the cause of the security incident involving OpenAI and Mixpanel...

Be careful when using SSDs! Without power, you risk data loss

XDA Developers reminds us that using solid-state drives for long-term storage is risky. If SSDs are left without power for years, data can become corrupted or even disappear entirely. Unlike...

Quantum Computing vs. Artificial Intelligence: Which Will Really Change the Future?

Quantum mechanics remains a complex and mysterious field, both difficult to explain and difficult to understand. This branch of physics studies the unusual behavior of tiny particles, phenomena that are...

ToddyCat APT Group Targets Microsoft 365 Email Security

Email security continues to be one of the most critical points in modern cyber attacks. While compromising a Windows domain is already a success for a malicious actor, gaining access...

Tor Boosts Security with Counter Galois Onion CGO Encryption

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to...

WormGPT 4: AI-Powered Cybercrime Tools on the Rise

Cybercriminals no longer need to convince ChatGPT or Claude Code to write malware or data-stealing scripts. A whole class of specialized language models, specifically designed for attacks, already exists. One...

EU lawmakers push for Microsoft alternative to boost tech sovereignty

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE