Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Heliaca 970x120 1
Precedente Successivo

Latest news

Claude Shannon: Father of Cryptography and Founder of the Information Age Cybercrime

Claude Shannon: Father of Cryptography and Founder of the Information Age

Whoever has as a mission, to deal with computer security and therefore also with cryptography, must necessarily pass through the...
Carlo Denza - July 8, 2025
Who are the most famous hackers in history? Cyber News

Who are the most famous hackers in history?

We often talk about hackers, but who are the famous hackers that ever existed? Considered by many as eccentric geniuses...
Silvia Felici - July 8, 2025
Underwater cables and the “cyber war of the seabed”. Between control, geopolitics and technology Cyber News

Underwater cables and the “cyber war of the seabed”. Between control, geopolitics and technology

Author: 5ar0m4n Publishing Date: 11/7/2021 We have often addressed the topic of undersea cables on RHC where we talked about...
Sandro Sana - July 8, 2025
Pig Butchering Scam: How Pig Slaughter Is Becoming an Emotional Addiction Scam Cyber News

Pig Butchering Scam: How Pig Slaughter Is Becoming an Emotional Addiction Scam

In the interconnected labyrinth of the 21st century, where the desire for authenticity and the search for opportunity dance on...
Redazione RHC - July 8, 2025
Human Replatforming! Artificial Intelligence Threatens Half of Jobs Cyber News

Human Replatforming! Artificial Intelligence Threatens Half of Jobs

The chairman of the American car company Ford, Jim Farley, has released a statement sharp on the future of the...
Luca Vinciguerra - July 8, 2025
Pig Butchering Scam: How Pig Slaughter Is Becoming an Emotional Addiction Scam Cyber News

Pig Butchering Scam: How Pig Slaughter Is Becoming an Emotional Addiction Scam

In the interconnected labyrinth of the 21st century, where the desire for authenticity and the search for opportunity dance on...
Daniela Farina - July 7, 2025

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE