Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

UtiliaCS 970x120
Precedente Successivo

Latest news

Critical PromptPwnd Vulnerability Exposes AI-Powered GitLab, GitHub Pipelines Cyber News

Critical PromptPwnd Vulnerability Exposes AI-Powered GitLab, GitHub Pipelines

A critical vulnerability, identified as "PromptPwnd," affects AI agents that are integrated into the GitLab CI/CD and GitHub Actions pipelines....
Massimiliano Brolli - December 9, 2025
LLM-Powered Malware: The Future of Autonomous Cyber Threats Cyber News

LLM-Powered Malware: The Future of Autonomous Cyber Threats

Researchers at Netskope Threat Labs have just published a new analysis on the possibility of creating autonomous malware built exclusively...
Agostino Pellegrino - December 9, 2025
Intellexa Exploits Zero-Day Vulnerabilities with Spyware Vulnerability

Intellexa Exploits Zero-Day Vulnerabilities with Spyware

Despite significant geopolitical challenges, the mercenary spyware industry remains a resilient and persistent threat; in this context, the well-known vendor...
Agostino Pellegrino - December 8, 2025
Malaysia Cracks Down on Bitcoin Mining Thefts Cyber News

Malaysia Cracks Down on Bitcoin Mining Thefts

Thieves usually target tangible assets: cash or non-cash, jewelry, cars. But with cryptocurrencies, things are much stranger. Malaysian police are...
Bajram Zeqiri - December 8, 2025
US Brothers Accused of Destroying 96 Databases with AI Cyber News

US Brothers Accused of Destroying 96 Databases with AI

The U.S. Department of Justice has accused twin brothers Muneeb and Sohaib Akhter of deleting 96 databases containing sensitive information,...
Redazione RHC - December 8, 2025
US Seizes Phishing Site Used by Myanmar Scammers to Steal Millions Cyber News

US Seizes Phishing Site Used by Myanmar Scammers to Steal Millions

The U.S. Department of Justice has announced the shutdown of a phishing website used by scammers in Myanmar to steal...
Redazione RHC - December 8, 2025

The extraordinary story of Alan Turing, the father of computer science: from his tumultuous childhood to his revolutionary contributions

Madras, early 1900s. The British Empire dominates India. Julius, a history graduate from Oxford University, serves as a colonial administrative clerk in the Indian Civil Service. He and his wife,...

The Windows 98 Blue Screen of Death That Changed Microsoft’s Plans

It was April 20, 1998. Microsoft was so embarrassed by the iconic Windows 98 blue screen of death on stage that it decided to change plans for building a new...

21 Years of Firefox: A History of Innovation and Independence

November 9th marked the 21st anniversary of Firefox 1.0. In 2004, it was the first stable release of Mozilla's new browser, which quickly positioned itself as a simple and secure...

The Illicit Distribution of Intimate Images: A Threat to Women’s Freedom

This is the fourth in a series of articles analyzing gender-based violence in the digital context, in anticipation of November 25, the International Day for the Elimination of Violence against...

Artificial intelligence surpasses humans, but not in every field. Is AGI near or far away?

According to experts, humanity has entered a new stage in the development of artificial intelligence: an era in which systems no longer simply assist humans , but are able to...
Tecno-ottimismo VS potere del controllo IA

Techno-optimism vs. the power of control: are we the greatest threat from AI?

Imagine a futuristic city split in half: on one side, glittering towers of innovation; on the other, chaos and the shadows of lost control. This isn't a dystopian vision, but...

Domestic robots and privacy: the hidden price of the automated future

The home of the future is full of robots. Automated laundries, personal assistants, and small electronic housekeepers are all devices designed to free up precious time and make domestic life...

The tale of the Mayor who thought of banning axes… but then came the Saws

Once upon a time, there was a town that had a Magical Forest. It was happy to have it, even a little proud. Which is why all the citizens willingly...

WhatsApp used to spread LANDFALL, the new spyware for Android Samsung

Researchers at Palo Alto Networks Unit 42 have discovered a new, previously unknown family of Android spyware called LANDFALL . To spread it, malicious actors exploited a zero-day vulnerability (CVE-2025-21042)...

Sam Altman: “I hope that bad things don’t happen because of technology.”

The latest statements by Sam Altman, CEO of OpenAI, regarding the progress of artificial intelligence (AI) are not very encouraging, as he recently stated that he is concerned about "the...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE