Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Banner Ransomfeed 970x120 1
Precedente Successivo

Latest news

Logitech Hit by Clop Ransomware Attack, Data Breach Exposed Cybercrime

Logitech Hit by Clop Ransomware Attack, Data Breach Exposed

Logitech representatives have notified authorities of a cyberattack and a serious data breach . The notorious Clop ransomware group, which...
Pietro Melillo - November 26, 2025
Malware Uses Finger Command to Infect Windows Devices Cyber News

Malware Uses Finger Command to Infect Windows Devices

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades...
Redazione RHC - November 26, 2025
The Future of Tech: How to Navigate the Digital World Cybercrime

The Future of Tech: How to Navigate the Digital World

There are books that explain technology and books that make you understand why you should pause for a minute before...
Silvia Felici - November 26, 2025
Google Gemini 3.0 Shakes Nvidia’s AI Dominance with TPU Innovation Cyber News

Google Gemini 3.0 Shakes Nvidia’s AI Dominance with TPU Innovation

Nvidia's dominance in the artificial intelligence (AI) sector was shaken by the acclaim for Google's "Gemini 3.0." Nvidia's stock price...
Redazione RHC - November 25, 2025
CISA Warns of Spyware Attacks on Mobile Messaging Apps Cyber News

CISA Warns of Spyware Attacks on Mobile Messaging Apps

An important advisory was published on Monday by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) , warning that malicious...
Massimiliano Brolli - November 25, 2025
GDPR Data Breach: Email Errors and Consequences Cybercrime

GDPR Data Breach: Email Errors and Consequences

Like it or not, sending an email to the wrong recipient constitutes a personal data breach under the GDPR. This...
Stefano Gazzella - November 25, 2025

Russia and Cybercrime: A Balance Between Selective Repression and State Interest

The Russian cybercrime ecosystem has entered a phase of profound transformation, triggered by a combination of factors: unprecedented international pressure from law enforcement agencies, a shift in domestic priorities, and...

Microsoft Edge protects Internet Explorer mode from attacks

The Microsoft Edge security team made significant changes to Internet Explorer mode after receiving confirmation of targeted attacks using it. Experts discovered that attackers exploited vulnerabilities in the outdated Chakra...

Canada’s craft beer competition ends in chaos over AI judges

A major Canadian craft beer competition has become the center of controversy after unexpectedly introducing artificial intelligence into the beverage judging process. The decision to integrate algorithms without warning sparked...

Artificial General Intelligence (AGI): the first global standard for measuring it has been defined

On October 21, 2025, an international team of researchers from 29 leading institutions—including Stanford University, MIT, and the University of California, Berkeley —completed a study that marks a milestone in...

Russia legalizes white hat hackers with new law

Russia is preparing a new version of a bill legalizing white hat hackers . Two sources in government agencies and the cybersecurity industry told RBC that the document has already...

Azure under attack: Fake apps imitating Microsoft Teams and Azure Portal

A new wave of digital deception has hit the Microsoft Azure ecosystem, where newly discovered vulnerabilities have allowed cybercriminals to create malicious apps that perfectly mimic official services like Microsoft...

131 WhatsApp Web Chrome Extensions Used for Mass Spam Discovered

Researchers discovered 131 extensions for automating WhatsApp Web in the official Chrome store. All were being used to send mass spam to Brazilian users. According to Socket analysts, all these...

Google launches Gemini 3.0 Pro: new multimodal language model

Google has quietly launched Gemini 3.0 Pro , the latest development in its multimodal language model. The stated goal: to improve contextual reasoning, the quality of results, and integration with...

Oracle Critical Patch Update October 2025: 374 vulnerabilities fixed

Oracle has released its new quarterly security update, the October 2025 Critical Patch Update , which addresses 374 vulnerabilities identified in numerous Oracle products. This is one of the largest...

China launches UBIOS, the first national standard for system firmware.

The Global Computing Consortium (GCC) officially announced the release of the group standard " Uniform Basic Input/Output System (UBIOS) Infrastructure Specification" (T/GCC 3007-2025) on October 21. This is China's first...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE