Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

LECS 970x120 1
Precedente Successivo

Latest news

Regulating out-of-office work: a best practice for organizations and beyond. Culture

Regulating out-of-office work: a best practice for organizations and beyond.

When talking about information security, we must first take a breath and realize that we need to dive deeper than...
Stefano Gazzella - September 15, 2025
Apple introduces Memory Integrity Enforcement. Will this be the end of hacking? Cyber News

Apple introduces Memory Integrity Enforcement. Will this be the end of hacking?

Apple officially introduced Memory Integrity Enforcement, a new memory protection system that the company calls the most significant advancement ever...
Manuel Roccon - September 15, 2025
Happy Birthday, Super Mario Bros.! 40 years of a game that revolutionized the world. Cyber News

Happy Birthday, Super Mario Bros.! 40 years of a game that revolutionized the world.

It's been exactly four decades since the release of the legendary Super Mario Bros., a project that changed the video...
Redazione RHC - September 14, 2025
China Makes Historic Turn: Mandatory Labeling of AI-Created Content Cyber News

China Makes Historic Turn: Mandatory Labeling of AI-Created Content

A series of Chinese national standards came into force on September 1st, aimed at redefining rules, responsibilities, and controls in...
Redazione RHC - September 14, 2025
Attention seniors! Ruthless hacker scam: Criminal hackers steal your life savings. Cyber News

Attention seniors! Ruthless hacker scam: Criminal hackers steal your life savings.

According to the New York State Attorney General's Office, the primary target of criminal hackers is the elderly and those...
Marcello Filacchioni - September 13, 2025
Quantum algorithm solves complex mathematical problem Cyber News

Quantum algorithm solves complex mathematical problem

Researchers have used a quantum algorithm for the first time to solve a complex mathematical problem that for over a...
Redazione RHC - September 13, 2025

North Korea’s cyberwarfare and its cyber army (part one)

Author: Olivia Terragni During the night, only one bright spot lights up in North Korea: the city of Pyongyang. Perhaps, due to the dark that surrounds it, we understand so...

Making the cyber world a safer and better place: an interview with W1ntermute

Author: Olivia terragni Pubblication Date: 11/11/2021 W1ntermute aka Sofya Ivanov is a woman who works in the cybersecurity industry as a network security analyst and open-source intelligence (OSINT) specialist. This...

Ada Lovelace and Charles Babbage, pioneers of programmable computing

Author: Antonio Piovesan Great Britain, middle decades of the 19th century, times of unprecedented engineering ambitions. Engineering, transportation, communications, architecture, science and manufacturing are in a feverish state of evolution....

Dharma/Crysis: Overview and adversary tracking

Author: Emanuele De Lucia Pubblication date: 17/09/2021 This report presents an overview about Dharma/Crysis ransomware. This piece of malware is often observed as late-stage payload in attacks against internet-facing systems,...

Avoiding the fis-hack-erman’s hook (aka Detecting a Phishing email)

Author: Antonio PiovesanPubblication Date: 09/08/2021 With the increase of ransomware infections - often instigated through phishing emails, it's very important/crucial to take proactive measures to help protect yourself and your...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE