Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Banner Desktop
Precedente Successivo

Latest news

Be careful when using SSDs! Without power, you risk data loss Cyber News

Be careful when using SSDs! Without power, you risk data loss

XDA Developers reminds us that using solid-state drives for long-term storage is risky. If SSDs are left without power for...
Redazione RHC - November 27, 2025
Quantum Computing vs. Artificial Intelligence: Which Will Really Change the Future? Cyber News

Quantum Computing vs. Artificial Intelligence: Which Will Really Change the Future?

Quantum mechanics remains a complex and mysterious field, both difficult to explain and difficult to understand. This branch of physics...
Luca Vinciguerra - November 27, 2025
ToddyCat APT Group Targets Microsoft 365 Email Security Cyber News

ToddyCat APT Group Targets Microsoft 365 Email Security

Email security continues to be one of the most critical points in modern cyber attacks. While compromising a Windows domain...
Redazione RHC - November 27, 2025
WormGPT 4: AI-Powered Cybercrime Tools on the Rise Cyber News

WormGPT 4: AI-Powered Cybercrime Tools on the Rise

Cybercriminals no longer need to convince ChatGPT or Claude Code to write malware or data-stealing scripts. A whole class of...
Agostino Pellegrino - November 26, 2025
Investment Scam Alert: How to Avoid Losing Thousands Cyber News

Investment Scam Alert: How to Avoid Losing Thousands

Hi everyone... my name is Marco, I'm 37 years old and I work as an administrative clerk in an accounting...
Silvia Felici - November 26, 2025
Trump Launches Genesis AI Mission to Revolutionize US Science Cyber News

Trump Launches Genesis AI Mission to Revolutionize US Science

US President Donald Trump signed an executive order, " Launching the Genesis Mission," establishing a national program for the use...
Redazione RHC - November 26, 2025

Apache Tomcat Vulnerability: Update Now to Avoid Security Risks

Many web applications rely on Apache Tomcat, a widely used open-source Java servlet container. On October 27, 2025, Apache disclosed two vulnerabilities: CVE-2025-55752 and CVE-2025-55754, affecting several versions of Tomcat....

Paycheck piracy is coming! And the paycheck transfer goes to criminals.

According to a new report from Microsoft Threat Intelligence , the financially motivated Storm-2657 group is conducting large-scale attacks against universities and businesses , using stolen employee accounts to redirect...

Microsoft Teams will spy on your boss when you’re out of the office! Location tracking will be rolled out in December.

Microsoft Teams will receive an update in December 2025 that will allow you to track employee locations over your office Wi-Fi network. According to the Microsoft 365 roadmap , "when...

Australia: Microsoft accused of deceptive practices in Microsoft 365 renewals

Australia's competition watchdog, the ACCC, said subscribers to Microsoft 365 Personal and Family plans were being asked to pay higher prices for Copilot or cancel their subscriptions. According to the...

The secret behind Space Invaders’ speed? A technical limitation of the hardware

In 1978, Taito's Space Invaders captivated audiences with its seemingly ingenious gameplay: the more aliens you shot down, the faster the remaining ones moved. A crescendo of tension that marked...

$2.8 billion in cryptocurrency stolen! Here’s how North Korea circumvents UN sanctions.

Member countries of the international monitoring group MSMT have concluded that North Korea is increasing its use of cybercrime and the remote work of its citizens abroad to circumvent international...

OpenAI is working on a neural network for music creation

According to The Information, OpenAI is actively working on its own neural network for music creation , which will compete with projects like Suno and Udio. The publication's sources report...

Oracle VirtualBox Vulnerability: Risk of Virtual Machine Escape

BI.ZONE specialists have identified two vulnerabilities (CVE-2025-62592 and CVE-2025-61760) in Oracle VirtualBox. When combined, they allowed an attacker to exit a virtual machine and reach the ARM-based macOS host system....

BreachForums Resurrects After Yet Another FBI Shutdown

We've often quoted this phrase: "Fighting cybercrime is like pulling weeds: if you don't completely eradicate them, they'll grow back, much more vigorous than before," and it's more relevant than...

Gemini 3.0 Pro: Google prepares for the generational leap and aims to surpass GPT-5 and Claude 4.5

Over the past few days, some users have received a notification saying that their Gemini Advanced devices have been "upgraded from the previous generation model to the 3.0 Pro, the...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE