Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

970x120 Olympous
Precedente Successivo

Latest news

Burnout in Cybersecurity: The Hidden Risk to Your Organization Culture
APT28 Phishing Campaign: Credential Harvesting Tactics Cybercrime
Poisoning AI Data: The New Threat to Machine Learning Models Cyber News
Pig Butchering Scams Evolve with PBaaS: The New Threat Cyber News
Apache Struts 2 Vulnerability CVE-2025-68493 Exposes Sensitive Data Cyber News
Uncovering Dark AI: The Truth Behind Crime-as-a-Service Chatbots Cyber News
AI-Generated Mac Malware: SimpleStealth Threatens User Security Cyber News
The Future of Tech: Sovereignty, Security, and Cloud Control Cyber News
Phishing Emails Mimic Internal Comms via Microsoft 365 Spoofing Cyber News
Lovense Emily AI Doll: Revolutionary Companion at CES 2026 Cyber News

Linux 7.0 says goodbye to the HIPPI relic: a piece of supercomputing history has been eliminated.

The Linux kernel has long been a well-established reality, and while it still contains code for technologies no longer in use, it's likely that some people still rely on these...

“I Stole 120,000 Bitcoins”: The Confession of the Bitfinex Hacker Who Now Wants to Defend Cyberspace

The story ofIlya Lichtenstein, the hacker responsible for one of the largest cyber attacks ever carried out against cryptocurrencies, reads like an episode of a TV series, yet it is...

A working browser built with AI using 3 million lines of code: breakthrough or illusion?

A week ago, Cursor CEO Michael Truell announced a supposedly remarkable achievement. He claimed that, using GPT-5.2, Cursor had created a browser capable of running continuously for an entire week....

Kimwolf: The IoT botnet that moves silently across corporate and government networks

The Kimwolf botnet represents one of the most insidious IoT threats to emerge recently. According to the latest analyses, this malicious infrastructure has already compromised over two million devices ,...

NoName057(16) hits Italy 487 times in the last 3 months: the DDoS wave does not stop

Italy has confirmed itself as one of the main targets of the DDoS attack campaign carried out by the hacktivist group NoName057(16) . According to what was declared directly by...

Undersea Cables: Ignored Warnings and Uncertain Trials. The Truth About Underwater Accidents

In recent years, Taiwan has seen a series of incidents in which its undersea cables have been damaged or destroyed, creating damage to critical infrastructure and political tensions. The Control...

CISA Updates Vulnerability Catalog: New Cybersecurity Threats

The Cybersecurity and Infrastructure Security Agency (CISA) has updated its catalog of known exploited vulnerabilities (KEVs) with four new entries , demonstrating that hackers are actively exploiting vulnerabilities in popular...

NexPhone: Three operating systems in your pocket! The phone that challenges the very concept of a PC.

The question has been circulating for over ten years: can a smartphone really replace a computer? Over time, the industry has repeatedly attempted to provide a concrete answer, without ever...

BlueNoroff: The Hacker Group Revolutionizing Cybercrime

The BlueNoroff hacker group has long since transformed cybercrime into a high-tech business, with tens of millions of dollars, cryptocurrency assets, and entire financial ecosystems at stake. A report by...

Your MFA is no longer enough: Phishing kits bypass multi-factor authentication

The amount of PhaaS kit has doubled since last year, according to an analysis by Barracuda Networks, placing increased pressure on security teams. Aggressive newcomers Whisper 2FA and GhostFrame introduced...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE