Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Ransomfeed 320x100 1
LECS 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

OpenAI Puts Parents in Control: Parental Controls Arrive on ChatGPT Cybercrime

OpenAI Puts Parents in Control: Parental Controls Arrive on ChatGPT

At a time when controversy over the impact of artificial intelligence on youth mental health is growing, the introduction of...
Redazione RHC - 3 September 2025
Lovable, the Swedish AI unicorn that’s revolutionizing programming Cybercrime

Lovable, the Swedish AI unicorn that’s revolutionizing programming

This year's TechBBQ conference was packed to capacity at Copenhagen's Bella Center when Anton Osika, co-founder of the AI-powered programming...
Redazione RHC - 3 September 2025
Open Data and Big Data: Data Management and a Comparison of Hadoop vs. Spark Cybercrime

Open Data and Big Data: Data Management and a Comparison of Hadoop vs. Spark

Today, for all large companies, data represents a strategic resource of primary importance. Thanks to the information obtained, it is...
Antonino Battaglia - 3 September 2025
Trend Micro: Beware of the “Task Scam,” the scam targeting online job seekers. Cybercrime

Trend Micro: Beware of the “Task Scam,” the scam targeting online job seekers.

The latest research from the security leader reveals the fraudulent mechanisms behind fake job opportunities offered by digital platforms The...
Redazione RHC - 3 September 2025
Palo Alto Networks Also Compromised via Salesforce and Drift Cybercrime

Palo Alto Networks Also Compromised via Salesforce and Drift

In early September 2025, Palo Alto Networks confirmed it had been the victim of a data breach. The compromise did...
Antonio Piazzolla - 2 September 2025
The Battle Between OnlyFans and Google: Piracy, AI, and the Chaos of Automated Copyright Cybercrime

The Battle Between OnlyFans and Google: Piracy, AI, and the Chaos of Automated Copyright

The massive clash between adult content creators and pirates, now transferred to automated copyright protection systems, is beginning to radically...
Redazione RHC - 2 September 2025

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Internet Shutdowns Cost $19.7B in 2025, Sophisticated Censorship Rises
Redazione RHC - 11/01/2026

Imagine a situation where the internet appears to be working, but websites won’t open beyond the first screen, messaging apps are intermittent, and businesses are constantly changing. According to the authors of a recent annual…

Immagine del sitoCybercrime
Instagram Data Leak Exposes 17.5 Million Users on Dark Web
Redazione RHC - 10/01/2026

A massive digital archive containing the private information of approximately 17.5 million Instagram users appears to have fallen into the hands of cybercriminals. A few hours ago, the alarm was raised after several Reddit users…

Immagine del sitoCybercrime
Undertow Vulnerability CVE-2025-12543 Exposes Java Ecosystem to Critical Security Risks
Redazione RHC - 09/01/2026

A flaw has been discovered in the foundation of the Java web ecosystem. Undertow , the high-performance web server that powers enterprise heavyweights like WildFly and JBoss EAP , has been hit by a critical…

Immagine del sitoCybercrime
Iran Protests Escalate as Reza Pahlavi Calls for Action Against Government
Redazione RHC - 09/01/2026

Iranian protesters chanted and marched through the streets until Friday morning, following a call from exiled former Prince Reza Pahlavi to demonstrate, despite the Iranian theocracy cutting off the country from the internet and international…

Immagine del sitoCybercrime
Veeam Backup Vulnerability: Critical RCE Flaw Discovered – Update Now
Redazione RHC - 08/01/2026

Backups are generally considered the last line of defense, but this week Veeam reminded us that backup systems themselves can become entry points for attacks. The company released security updates for Backup & Replication ,…