Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

970x120 Enterprise 1
Precedente Successivo

Latest news

WormGPT 4: AI-Powered Cybercrime Tools on the Rise Cyber News

WormGPT 4: AI-Powered Cybercrime Tools on the Rise

Cybercriminals no longer need to convince ChatGPT or Claude Code to write malware or data-stealing scripts. A whole class of...
Agostino Pellegrino - November 26, 2025
Investment Scam Alert: How to Avoid Losing Thousands Cyber News

Investment Scam Alert: How to Avoid Losing Thousands

Hi everyone... my name is Marco, I'm 37 years old and I work as an administrative clerk in an accounting...
Silvia Felici - November 26, 2025
Trump Launches Genesis AI Mission to Revolutionize US Science Cyber News

Trump Launches Genesis AI Mission to Revolutionize US Science

US President Donald Trump signed an executive order, " Launching the Genesis Mission," establishing a national program for the use...
Redazione RHC - November 26, 2025
Cybersecurity in the Middle East: Egitto and Qatar Lead the Way Cyber News

Cybersecurity in the Middle East: Egitto and Qatar Lead the Way

Global attention to cybersecurity continues to grow in a context dominated by digital transformation and the rapid spread of artificial...
Agostino Pellegrino - November 26, 2025
Logitech Hit by Clop Ransomware Attack, Data Breach Exposed Cybercrime

Logitech Hit by Clop Ransomware Attack, Data Breach Exposed

Logitech representatives have notified authorities of a cyberattack and a serious data breach . The notorious Clop ransomware group, which...
Pietro Melillo - November 26, 2025
Malware Uses Finger Command to Infect Windows Devices Cyber News

Malware Uses Finger Command to Infect Windows Devices

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades...
Redazione RHC - November 26, 2025

Oracle VirtualBox Vulnerability: Risk of Virtual Machine Escape

BI.ZONE specialists have identified two vulnerabilities (CVE-2025-62592 and CVE-2025-61760) in Oracle VirtualBox. When combined, they allowed an attacker to exit a virtual machine and reach the ARM-based macOS host system....

BreachForums Resurrects After Yet Another FBI Shutdown

We've often quoted this phrase: "Fighting cybercrime is like pulling weeds: if you don't completely eradicate them, they'll grow back, much more vigorous than before," and it's more relevant than...

Gemini 3.0 Pro: Google prepares for the generational leap and aims to surpass GPT-5 and Claude 4.5

Over the past few days, some users have received a notification saying that their Gemini Advanced devices have been "upgraded from the previous generation model to the 3.0 Pro, the...

Neolix raises $600 million for autonomous driving in urban logistics

Chinese startup Neolix , specializing in Level 4 autonomous vehicles for urban deliveries, announced on October 23 that it has closed a Series D round of over $600 million ,...

Supercomputing power in a refrigerator: the BIE-1 revolution

On October 24, the world's first human-inspired intelligent computing system, the "BI Explorer BIE-1," was officially unveiled at the Guangdong-Macao Deep Cooperation Zone in Hengqin. Zhang Xu, director of the...

AVKiller + HeartCrypt: The Combo That Opens the Door to Ransomware

A tool has appeared on the cybercriminal market that has quickly become a mass-produced weapon for dozens of groups. It's HeartCrypt , a malware packaging service masquerading as a legitimate...

DC Comics takes a stand: “No generative AI”

DC Comics has definitively stated its position on generative AI: no machine involvement in the storytelling or illustrations . The announcement was made by company president Jim Lee during a...

A “hacked” water system: hacktivism becomes digital propaganda

In September, Forescout specialists detected a targeted attack on their honeypot server, which mimicked the control system of a water treatment plant. A new hacktivist group, TwoNet , operating in...

Russia and Cybercrime: A Balance Between Selective Repression and State Interest

The Russian cybercrime ecosystem has entered a phase of profound transformation, triggered by a combination of factors: unprecedented international pressure from law enforcement agencies, a shift in domestic priorities, and...

Microsoft Edge protects Internet Explorer mode from attacks

The Microsoft Edge security team made significant changes to Internet Explorer mode after receiving confirmation of targeted attacks using it. Experts discovered that attackers exploited vulnerabilities in the outdated Chakra...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE