Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Redhotcyber Banner Sito 970x120px Uscita 101125
Precedente Successivo

Latest news

God is in the Cloud: They Hacked Your Brain and You Liked It Cybercrime

God is in the Cloud: They Hacked Your Brain and You Liked It

We're in the age of paid deception. Your every click is a private referendum in which they, the algorithms, always...
Fabrizio Saviano - November 28, 2025
Does Windows Suck? A Video by Dave Plummer, the Microsoft Engineer Who Created Task Manager Cyber News

Does Windows Suck? A Video by Dave Plummer, the Microsoft Engineer Who Created Task Manager

Dave Plummer, a highly regarded former senior engineer at Microsoft who led the development of several key Windows components, including...
Redazione RHC - November 28, 2025
ENISA takes on the role of Root in the European Cybersecurity Initiative (CVE). Cyber News

ENISA takes on the role of Root in the European Cybersecurity Initiative (CVE).

The European Union Agency for Cybersecurity (ENISA) has taken on the role of Root within the Common Vulnerabilities and Exposures...
Silvia Felici - November 27, 2025
Be careful when using SSDs! Without power, you risk data loss Cyber News

Be careful when using SSDs! Without power, you risk data loss

XDA Developers reminds us that using solid-state drives for long-term storage is risky. If SSDs are left without power for...
Redazione RHC - November 27, 2025
Quantum Computing vs. Artificial Intelligence: Which Will Really Change the Future? Cyber News

Quantum Computing vs. Artificial Intelligence: Which Will Really Change the Future?

Quantum mechanics remains a complex and mysterious field, both difficult to explain and difficult to understand. This branch of physics...
Luca Vinciguerra - November 27, 2025
ToddyCat APT Group Targets Microsoft 365 Email Security Cyber News

ToddyCat APT Group Targets Microsoft 365 Email Security

Email security continues to be one of the most critical points in modern cyber attacks. While compromising a Windows domain...
Redazione RHC - November 27, 2025

Paycheck piracy is coming! And the paycheck transfer goes to criminals.

According to a new report from Microsoft Threat Intelligence , the financially motivated Storm-2657 group is conducting large-scale attacks against universities and businesses , using stolen employee accounts to redirect...

Microsoft Teams will spy on your boss when you’re out of the office! Location tracking will be rolled out in December.

Microsoft Teams will receive an update in December 2025 that will allow you to track employee locations over your office Wi-Fi network. According to the Microsoft 365 roadmap , "when...

Australia: Microsoft accused of deceptive practices in Microsoft 365 renewals

Australia's competition watchdog, the ACCC, said subscribers to Microsoft 365 Personal and Family plans were being asked to pay higher prices for Copilot or cancel their subscriptions. According to the...

The secret behind Space Invaders’ speed? A technical limitation of the hardware

In 1978, Taito's Space Invaders captivated audiences with its seemingly ingenious gameplay: the more aliens you shot down, the faster the remaining ones moved. A crescendo of tension that marked...

$2.8 billion in cryptocurrency stolen! Here’s how North Korea circumvents UN sanctions.

Member countries of the international monitoring group MSMT have concluded that North Korea is increasing its use of cybercrime and the remote work of its citizens abroad to circumvent international...

OpenAI is working on a neural network for music creation

According to The Information, OpenAI is actively working on its own neural network for music creation , which will compete with projects like Suno and Udio. The publication's sources report...

Oracle VirtualBox Vulnerability: Risk of Virtual Machine Escape

BI.ZONE specialists have identified two vulnerabilities (CVE-2025-62592 and CVE-2025-61760) in Oracle VirtualBox. When combined, they allowed an attacker to exit a virtual machine and reach the ARM-based macOS host system....

BreachForums Resurrects After Yet Another FBI Shutdown

We've often quoted this phrase: "Fighting cybercrime is like pulling weeds: if you don't completely eradicate them, they'll grow back, much more vigorous than before," and it's more relevant than...

Gemini 3.0 Pro: Google prepares for the generational leap and aims to surpass GPT-5 and Claude 4.5

Over the past few days, some users have received a notification saying that their Gemini Advanced devices have been "upgraded from the previous generation model to the 3.0 Pro, the...

Neolix raises $600 million for autonomous driving in urban logistics

Chinese startup Neolix , specializing in Level 4 autonomous vehicles for urban deliveries, announced on October 23 that it has closed a Series D round of over $600 million ,...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE