Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

970x20 Itcentric
Precedente Successivo

Latest news

Apple Develops Its Own Artificial Intelligence Engine to Power Siri Cyber News

Apple Develops Its Own Artificial Intelligence Engine to Power Siri

Apple is developing its own AI engine for answering questions, similar to ChatGPT, according to Bloomberg. The project is managed...
Luca Vinciguerra - August 5, 2025
Proxy Trickster: The Amateur Hackers Group That Wants to Own Servers Worldwide Cyber News

Proxy Trickster: The Amateur Hackers Group That Wants to Own Servers Worldwide

Specialists at Solar 4RAYS of Solar Group have discovered a new hacker group, Proxy Trickster, dedicated to cryptocurrency mining and...
Redazione RHC - August 5, 2025
Companies Go Bankrupt Due to Ransomware! Einhaus Group Shuts Down, Serving as a Warning to Everyone Cyber News

Companies Go Bankrupt Due to Ransomware! Einhaus Group Shuts Down, Serving as a Warning to Everyone

We discussed this in an article on the topic some time ago written by Massimiliano Brolli. Today, cybersecurity is no...
Redazione RHC - August 4, 2025
What are Rootkits? Discovering one of the most insidious threats Cybercrime

What are Rootkits? Discovering one of the most insidious threats

Rootkits are one of the most insidious and complex cyber threats in the digital security landscape. The term "rootkit" comes...
Sandro Sana - August 3, 2025
What is spyware: how it works and how it affects. The complete guide. Cyber News

What is spyware: how it works and how it affects. The complete guide.

Spyware is malware (malicious programs) designed to infiltrate users' computer systems to monitor their activities and collect personal information. These...
Bajram Zeqiri - August 3, 2025
Discovering Wipers: The Silent Threat That Ruthlessly Destroys Data Cyber News

Discovering Wipers: The Silent Threat That Ruthlessly Destroys Data

Wider malware (in Italian "eliminator" or "deleter") is a type of malicious software designed to destroy or "erase" data and...
Redazione RHC - August 3, 2025

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE