Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

UtiliaCS 970x120

Latest news

Android Colabrodo Edition: 120 vulnerabilities and two zero-days fixed Vulnerability

Android Colabrodo Edition: 120 vulnerabilities and two zero-days fixed

Google developers have released security updates for Android that address 120 operating system vulnerabilities. Two of these vulnerabilities, according to...
Agostino Pellegrino - September 5, 2025
New Wave of Quishing Attacks: Innovative Tactics from Cybercriminals Cyber News

New Wave of Quishing Attacks: Innovative Tactics from Cybercriminals

In recent years, a particularly insidious form of phishing has become widespread: Quishing or QRishing, a strategy based on the...
Marcello Filacchioni - September 4, 2025
Netshacker: Retrogaming e Hacking Reale su Commodore 64 Cybercrime

Netshacker: Retrogaming e Hacking Reale su Commodore 64

In the Commodore 64 gaming landscape, Netshacker stands out as a project that challenges the conventions of modern gaming, taking...
Marcello Filacchioni - September 4, 2025
Trump meets with all the AI tech leaders at the White House. Elon Musk is notably absent! Cyber News

Trump meets with all the AI tech leaders at the White House. Elon Musk is notably absent!

Today, Thursday, September 4, 2025, US President Donald Trump will host over two dozen technology and business leaders for a...
Redazione RHC - September 4, 2025
Microsoft Introduces POML for Orchestrating LLM Prompts Cyber News

Microsoft Introduces POML for Orchestrating LLM Prompts

Microsoft today introduced POML (Prompt Orchestration Markup Language), a new markup language for prompt orchestration and specifically designed to enable...
Redazione RHC - September 4, 2025
CISO vs. DPO: Collaboration or Cold War in Business? Cybercrime

CISO vs. DPO: Collaboration or Cold War in Business?

Managing security is far from simple, it's not something that can be standardized, and above all, it can't be achieved...
Stefano Gazzella - September 4, 2025
Revolutionize security models with the Unified SASE framework Cyber News

Revolutionize security models with the Unified SASE framework

A unified and secure approach to support digital transformation, enable hybrid working, and reduce operational complexity. By Federico Saraò, Specialized...
Redazione RHC - September 4, 2025
New blackmail: if you don’t pay, we’ll feed all your data to artificial intelligence! Cybercrime

New blackmail: if you don’t pay, we’ll feed all your data to artificial intelligence!

The hacker group LunaLock has added a new element to the classic extortion scheme, preying on the fears of artists...
Stefano Gazzella - September 3, 2025
Jaguar Land Rover victim of hacker attack: production halted! Cyber News

Jaguar Land Rover victim of hacker attack: production halted!

Automaker Jaguar Land Rover (JLR) announced that it was forced to disable several systems due to a hacker attack. The...
Redazione RHC - September 3, 2025
AI will grow by 50% and so will your anxiety about your electricity bill. Cyber News

AI will grow by 50% and so will your anxiety about your electricity bill.

The global data center industry is preparing for a sharp increase in computing platforms for AI demands. According to Goldman...
Redazione RHC - September 3, 2025
Cloudflare also hacked in the Salesforce incident! Cloud risks affect everyone. Cyber News

Cloudflare also hacked in the Salesforce incident! Cloud risks affect everyone.

A data intrusion was detected by Cloudflare, where an experienced attacker was able to access and steal sensitive customer data...
Redazione RHC - September 3, 2025
Critical vulnerability in IIS Web Deploy: PoC exploit is now public Vulnerability

Critical vulnerability in IIS Web Deploy: PoC exploit is now public

This week, a proof-of-concept exploit was published for CVE-2025-53772, a critical remote code execution vulnerability in Microsoft's IIS Web Deploy...
Agostino Pellegrino - September 3, 2025

Cyber Incident Management in the NIS2 Era

The NIS 2 Decree (Legislative Decree 138/2024), effective October 16, 2024, implements the principles of the European NIS2 Directive, laying the foundation for a more complex operational model of collaboration...

Tasting the Exploit: HackerHood tests Microsoft WSUS CVE-2025-59287 Exploit

The cybersecurity landscape was recently rocked by the discovery of a critical Remote Code Execution (RCE) vulnerability in Microsoft’s Windows Server Update Services (WSUS) . Identified as CVE-2025-59287 and with...

183 million Gmail accounts hacked! But it was just a hoax

For the second time in recent months, Google has been forced to deny reports of a massive Gmail data breach . The news was sparked by reports of a "hack...

Microsoft acquires 27% of OpenAI for $135 billion

After nearly a year of negotiations with its longtime backer Microsoft, OpenAI has granted the latter a 27% stake . This move eliminates significant uncertainty for both companies and paves...

Malware alert: Critical WordPress plugin vulnerabilities actively exploited

Wordfence is raising the alarm about a large-scale malware campaign in which attackers are exploiting critical vulnerabilities in the popular WordPress plugins GutenKit and Hunk Companion . The company blocked...

ClayRat: The spyware that targets Android users with self-propagation

The ClayRat spyware campaign is expanding rapidly and increasingly targeting Android users. According to Zimperium, the malware is actively spreading among Russian users through fake websites and Telegram channels, masquerading...

Be careful what you tell AI! It could be confidential data

In an age where every question is answered with a simple tap, we users have perhaps gotten a little too comfortable with the new AI-based assistants. Ultimately, it makes little...

Europe vs. Silicon Valley: “AI First” kicks off in Turin with von der Leyen

Von der Leyen launches "AI First" at Italian Tech Week: three obstacles to overcome and a €2 billion startup lost along the way. Turin, October 3, 2025. Before thousands of...
Tu vali empowerment ai giovani visione di Nicola Bellotti

“YOU ARE WORTH IT, YOU’RE NEVER TOO YOUNG TO CHANGE THE WORLD”: Nicola Bellotti’s vision

We often try to explain the hybrid, simultaneous, and contradictory world in which young people live in perpetual connection, but the truth is that as adults, we struggle to understand...

Gemini 3.0 Pro: What people who are trying it say

In recent days, a select few users have reported having access to the new Gemini 3.0 Pro model. Initial impressions suggest a significant improvement over the previous generation, so much...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE