Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Enterprise BusinessLog 320x200 1
Banner Ancharia Desktop 1 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever Cybercrime

The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his...
Redazione RHC - 25 November 2025
Anthropic Releases Claude Opus 4.5: AI Model for Enhanced Productivity Cybercrime

Anthropic Releases Claude Opus 4.5: AI Model for Enhanced Productivity

Anthropic has released Claude Opus 4.5 , its new flagship model, which the company says is the most powerful version...
Redazione RHC - 24 November 2025
Alibaba Qwen3Max Dominates AI Market with Rapid Growth Cybercrime

Alibaba Qwen3Max Dominates AI Market with Rapid Growth

On November 24, Alibaba announced Qwen3Max, which had been in public beta for a week , and had already surpassed...
Redazione RHC - 24 November 2025
Digital Surveillance at Work: The Rise of Algorithmic Monitoring Cybercrime

Digital Surveillance at Work: The Rise of Algorithmic Monitoring

Remote work has given employees freedom , but with it has also come digital surveillance . We discussed this some...
Redazione RHC - 24 November 2025
Windows Server Vulnerability Exploited: ShadowPad Malware Deployed Cybercrime

Windows Server Vulnerability Exploited: ShadowPad Malware Deployed

A recently patched vulnerability in Microsoft’s Windows Server update services has led to a series of attacks using one of...
Redazione RHC - 24 November 2025
Salesforce Data Breach: ShinyHunters Hack Gainsight Integration Cybercrime

Salesforce Data Breach: ShinyHunters Hack Gainsight Integration

The growing data leak from the Salesforce ecosystem has taken a new turn after the ShinyHunters group announced its involvement...
Redazione RHC - 24 November 2025

An AI extension for VS Code turns your PC into a digital hostage

Secure Annex researchers found a malicious extension in the Visual Studio Code Marketplace extension catalog for VS Code that features basic ransomware functionality. The malware was apparently written using Vibe...
Share on Facebook Share on LinkedIn Share on X

The Louvre’s security myth crumbles! Between audits, ridiculous passwords, and outdated cameras.

The recent theft at the Louvre Museum, located in the heart of Paris, has shocked not only the art world but also the cybersecurity world. On the night of October...
Share on Facebook Share on LinkedIn Share on X

Double-dealing: employees of a company that resolved ransomware attacks were launching them themselves

Three former DigitalMint employees, who investigated ransomware incidents and negotiated with ransomware groups, are accused of hacking into the networks of five American companies. According to the U.S. Department of...
Share on Facebook Share on LinkedIn Share on X

Cybersecurity is democratic: the same virus hits multinationals and housewives

The same malware that yesterday blocked the servers of a major bank today encrypts Mrs. Pina's photos on her home PC. As? With an innocuous WhatsApp message, sent by his...
Share on Facebook Share on LinkedIn Share on X

2 critical bugs detected on Cisco Unified Contact Center Express (CCX)

Cisco has published two new critical vulnerabilities affecting Cisco Unified Contact Center Express (CCX) , the platform used by thousands of companies to manage contact centers and unified communications. The...
Share on Facebook Share on LinkedIn Share on X

China is using artificial intelligence to improve mass surveillance

In Beijing, in a banquet hall of a luxury hotel, police officers from across the country attended a conference dedicated to the application of artificial intelligence to public safety ....
Share on Facebook Share on LinkedIn Share on X

Microsoft apologizes to 3 million Australian users for unfair business practices

Microsoft has apologised to nearly 3 million Australian users and offered them refunds for subscriptions to its new, more expensive Microsoft 365 office suite , which includes Copilot, an AI-powered...
Share on Facebook Share on LinkedIn Share on X

Cisco Addresses Critical Vulnerabilities in ASA and Unified Contact Center Express

Cisco recently announced the discovery of a new type of cyberattack aimed at compromising devices running Cisco Secure Firewall Adaptive Security Appliance (ASA) and Cisco Secure Firewall Threat Defense (FTD)...
Share on Facebook Share on LinkedIn Share on X

Rust Rebels! Fund Launched to Pay Open Source Maintainers

The Rust Foundation has announced the launch of the Maintainers Fund, a new program designed to support developers responsible for the stability and development of the Rust ecosystem. This step...
Share on Facebook Share on LinkedIn Share on X

12.5 million HD movies per second! Amazon’s undersea cable will connect the US to Ireland.

In a few years, Ireland and the United States will be connected by an undersea communications cable designed to help Amazon improve its AWS services. Undersea cables are a vital...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCulture
Long-Lived Technologies: COBOL, C, SQL, and Legacy Systems
Redazione RHC - 02/01/2026

While the industry debates which neural network is the “smartest” and which framework is the “most modern,” decades-old technologies continue to quietly swirl beneath the surface of the banking industry . This year, COBOL turned…

Immagine del sitoCybercrime
Finland Seizes Ship in Cable Damage Probe, Cites Security Threat
Redazione RHC - 31/12/2025

On Wednesday, December 31, Finnish authorities seized a cargo ship believed to be involved in the damage to an undersea telecommunications cable connecting Helsinki to Tallinn, Estonia. The action was triggered after a technical anomaly…

Immagine del sitoCybercrime
Ransomware Attacks on the Rise: US Professionals Turn to Cybercrime
Redazione RHC - 31/12/2025

In the landscape of cybercrime investigations, some cases take on particular significance not only because of the extent of the financial damage, but also because of the profile of the individuals involved . Ransomware investigations,…

Immagine del sitoCybercrime
The Dark Side of Cybercrime: Human Costs and Consequences
Redazione RHC - 31/12/2025

By 2025, cybercrime will increasingly go beyond “just money”: attacks aren’t just about downtime bills and ransom payments , but also about real human consequences, from healthcare disruptions and victim harassment to kidnappings, torture, and…

Immagine del sitoCybercrime
OpenAI Hiring Chief Security Officer to Mitigate AI Risks
Redazione RHC - 30/12/2025

OpenAI, the developer of ChatGPT, has announced the search for a new Chief Security Officer . The position, with an annual salary of $555,000, will be directly responsible for mitigating risks associated with artificial intelligence…