Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

970x120 Enterprise 1
Precedente Successivo

Latest news

Future prospects for computer science and technology graduates Cyber News

Future prospects for computer science and technology graduates

Artificial intelligence is changing the way recent computer science graduates approach the world of work. It's not about sudden job...
Redazione RHC - November 23, 2025
ATMs targeted! Cybersecurity experts reveal an attack campaign targeting ATMs. Cyber News

ATMs targeted! Cybersecurity experts reveal an attack campaign targeting ATMs.

Group-IB experts presented a detailed analysis of the long-running UNC2891 campaign, which demonstrated the continuing sophistication of ATM attack schemes....
Agostino Pellegrino - November 23, 2025
CrowdStrike Insider Fired for Providing Sensitive Data to Criminal Hackers Cyber News

CrowdStrike Insider Fired for Providing Sensitive Data to Criminal Hackers

In recent months, the insider problem has become increasingly important for large companies , and one recent episode involved CrowdStrike....
Marcello Filacchioni - November 22, 2025
Sneaky2FA: The phishing scam that steals credentials with browser-in-the-browser attacks Cyber News

Sneaky2FA: The phishing scam that steals credentials with browser-in-the-browser attacks

Push Security specialists have noticed that the Sneaky2FA phishing platform now supports browser-in-the-browser attacks, which allow the creation of fake...
Redazione RHC - November 22, 2025
TamperedChef: Malware via Fake App Installers Cyber News

TamperedChef: Malware via Fake App Installers

The large-scale TamperedChef campaign is once again attracting the attention of specialists, as attackers continue to distribute malware via fake...
Massimiliano Brolli - November 21, 2025
Critical Vulnerability in Azure Bastion Scores 10! When RDP and SSH in the Cloud Are Checkmated Cyber News

Critical Vulnerability in Azure Bastion Scores 10! When RDP and SSH in the Cloud Are Checkmated

An authentication bypass vulnerability has been discovered in Azure Bastion , Microsoft's managed service that enables secure RDP and SSH...
Agostino Pellegrino - November 21, 2025

Boris Johnson is enthusiastic about AI: he uses ChatGPT for his books.

Former British Prime Minister Boris Johnson has expressed his enthusiasm for artificial intelligence, revealing in an interview that he uses ChatGPT to write his books. "I love AI. I love...

Intel releases urgent patches for new Spectre variant

VUSec researchers have presented a paper titled "Training Solo," which challenges the fundamental principles of protection against Spectre-v2 attacks. Previously , the domain isolation mechanism was believed to completely eliminate...

Blockchain at risk! The quantum threat is a race against time

The race for quantum supremacy is turning into a race for cryptocurrency survival . If quantum computers reach the promised power, they will be able to break the cryptography that...

The 6 Best Hacker Girls of All Time

We often talk about hacking, hackers, cybercrime, black, gray, and white. But is "hacker" always synonymous with the male gender? The answer is obviously no. The best hacker girls Although...

Famous hackers: Albert Gonzalez, called Soupnazi

Born to Cuban parents in 1981, Albert Gonzalez attended South Miami High School in Miami, Florida. He was accused of acquiring and reselling over 180 million payment cards between 2005...

The most famous female hackers ever: Kimberley Vanvaeck aka Gigabyte.

Gigabyte is the pseudonym of Kimberley Vanvaeck, a Belgian hacker known for writing numerous high-end malware, as well as for a long-running dispute with the security firm Sophos. Gigabyte, when...

The Most Famous Hacker Girls Ever: Kristina Svechinskaya

In the collective imagination, the word "hacker" or "computer criminal" is a young man with enormous computer skills, but history has taught us that in a few rare cases this...

Famous Hackers: The Story of Adrian Lamo

Adrian Lamo was a hacker who found new ways to breach companies and make them realize how insecure they were. From his early hacks to hacking into prestigious companies while...

Lenovo launches the ThinkBook Plus G6 Rollable 2025 with a rollable display.

Tech giant Lenovo has officially started selling the ThinkBook Plus G6 Rollable 2025 , the world's first laptop with a rollable display , previewed at CES 2025. The device's main...

Inmates hack prison: sentences reduced, funds transferred, and unauthorized visits

The Romanian penitentiary system has found itself at the center of a major digital scandal: inmates in Târgu Jiu hacked the PNA's internal platform and, for several months, managed data...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE