Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Redhotcyber Banner Sito 970x120px Uscita 101125
Precedente Successivo

Latest news

Cybersecurity in the Middle East: Egitto and Qatar Lead the Way Cyber News

Cybersecurity in the Middle East: Egitto and Qatar Lead the Way

Global attention to cybersecurity continues to grow in a context dominated by digital transformation and the rapid spread of artificial...
Agostino Pellegrino - November 26, 2025
Logitech Hit by Clop Ransomware Attack, Data Breach Exposed Cybercrime

Logitech Hit by Clop Ransomware Attack, Data Breach Exposed

Logitech representatives have notified authorities of a cyberattack and a serious data breach . The notorious Clop ransomware group, which...
Pietro Melillo - November 26, 2025
Malware Uses Finger Command to Infect Windows Devices Cyber News

Malware Uses Finger Command to Infect Windows Devices

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades...
Redazione RHC - November 26, 2025
The Future of Tech: How to Navigate the Digital World Cybercrime

The Future of Tech: How to Navigate the Digital World

There are books that explain technology and books that make you understand why you should pause for a minute before...
Silvia Felici - November 26, 2025
Google Gemini 3.0 Shakes Nvidia’s AI Dominance with TPU Innovation Cyber News

Google Gemini 3.0 Shakes Nvidia’s AI Dominance with TPU Innovation

Nvidia's dominance in the artificial intelligence (AI) sector was shaken by the acclaim for Google's "Gemini 3.0." Nvidia's stock price...
Redazione RHC - November 25, 2025
CISA Warns of Spyware Attacks on Mobile Messaging Apps Cyber News

CISA Warns of Spyware Attacks on Mobile Messaging Apps

An important advisory was published on Monday by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) , warning that malicious...
Massimiliano Brolli - November 25, 2025

Gemini 3.0 Pro: Google prepares for the generational leap and aims to surpass GPT-5 and Claude 4.5

Over the past few days, some users have received a notification saying that their Gemini Advanced devices have been "upgraded from the previous generation model to the 3.0 Pro, the...

Neolix raises $600 million for autonomous driving in urban logistics

Chinese startup Neolix , specializing in Level 4 autonomous vehicles for urban deliveries, announced on October 23 that it has closed a Series D round of over $600 million ,...

Supercomputing power in a refrigerator: the BIE-1 revolution

On October 24, the world's first human-inspired intelligent computing system, the "BI Explorer BIE-1," was officially unveiled at the Guangdong-Macao Deep Cooperation Zone in Hengqin. Zhang Xu, director of the...

AVKiller + HeartCrypt: The Combo That Opens the Door to Ransomware

A tool has appeared on the cybercriminal market that has quickly become a mass-produced weapon for dozens of groups. It's HeartCrypt , a malware packaging service masquerading as a legitimate...

DC Comics takes a stand: “No generative AI”

DC Comics has definitively stated its position on generative AI: no machine involvement in the storytelling or illustrations . The announcement was made by company president Jim Lee during a...

A “hacked” water system: hacktivism becomes digital propaganda

In September, Forescout specialists detected a targeted attack on their honeypot server, which mimicked the control system of a water treatment plant. A new hacktivist group, TwoNet , operating in...

Russia and Cybercrime: A Balance Between Selective Repression and State Interest

The Russian cybercrime ecosystem has entered a phase of profound transformation, triggered by a combination of factors: unprecedented international pressure from law enforcement agencies, a shift in domestic priorities, and...

Microsoft Edge protects Internet Explorer mode from attacks

The Microsoft Edge security team made significant changes to Internet Explorer mode after receiving confirmation of targeted attacks using it. Experts discovered that attackers exploited vulnerabilities in the outdated Chakra...

Canada’s craft beer competition ends in chaos over AI judges

A major Canadian craft beer competition has become the center of controversy after unexpectedly introducing artificial intelligence into the beverage judging process. The decision to integrate algorithms without warning sparked...

Artificial General Intelligence (AGI): the first global standard for measuring it has been defined

On October 21, 2025, an international team of researchers from 29 leading institutions—including Stanford University, MIT, and the University of California, Berkeley —completed a study that marks a milestone in...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE