Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Heliaca 970x120 1
Precedente Successivo

Latest news

Red Hot Cyber Conference 2026: Sponsorships Open for the Fifth Edition in Rome Cyber News

Red Hot Cyber Conference 2026: Sponsorships Open for the Fifth Edition in Rome

The Red Hot Cyber Conference has become a regular event for the Red Hot Cyber community and for anyone working...
Silvia Felici - September 4, 2025
Microsoft Introduces POML for Orchestrating LLM Prompts Cyber News

Microsoft Introduces POML for Orchestrating LLM Prompts

Microsoft today introduced POML (Prompt Orchestration Markup Language), a new markup language for prompt orchestration and specifically designed to enable...
Redazione RHC - September 4, 2025
CISO vs. DPO: Collaboration or Cold War in Business? Cybercrime

CISO vs. DPO: Collaboration or Cold War in Business?

Managing security is far from simple, it's not something that can be standardized, and above all, it can't be achieved...
Stefano Gazzella - September 4, 2025
Revolutionize security models with the Unified SASE framework Cyber News

Revolutionize security models with the Unified SASE framework

A unified and secure approach to support digital transformation, enable hybrid working, and reduce operational complexity. By Federico Saraò, Specialized...
Redazione RHC - September 4, 2025
New blackmail: if you don’t pay, we’ll feed all your data to artificial intelligence! Cybercrime

New blackmail: if you don’t pay, we’ll feed all your data to artificial intelligence!

The hacker group LunaLock has added a new element to the classic extortion scheme, preying on the fears of artists...
Stefano Gazzella - September 3, 2025
Jaguar Land Rover victim of hacker attack: production halted! Cyber News

Jaguar Land Rover victim of hacker attack: production halted!

Automaker Jaguar Land Rover (JLR) announced that it was forced to disable several systems due to a hacker attack. The...
Redazione RHC - September 3, 2025

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE