Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Heliaca 970x120 1
Precedente Successivo

Latest news

The phenomenon of polarization on the internet: Hikikomori Culture

The phenomenon of polarization on the internet: Hikikomori

Many still maintain that hikikomori is an exclusively Japanese phenomenon. Yet, scientifically, numerous studies now confirm the existence of cases...
Daniela Farina - November 17, 2025
From Likes to Depression: How Social Media Can Affect Our Mental Health Cybercrime

From Likes to Depression: How Social Media Can Affect Our Mental Health

Questioning changes as they occur is always a difficult, if not downright foolhardy, undertaking. Certainly, when the object of the...
Daniela Farina - November 17, 2025
The US and Global Surveillance: Uncovering Section 702 of the Foreign Intelligence Surveillance Act Cybercrime

The US and Global Surveillance: Uncovering Section 702 of the Foreign Intelligence Surveillance Act

Privacy in the United States is a constant topic of debate, especially in the digital age. The Supreme Court has...
Aniello Giugliano - November 17, 2025
What is Cross-Site Scripting? An article to help you understand it in a simple way. Cybercrime

What is Cross-Site Scripting? An article to help you understand it in a simple way.

Author : Davide Cavallini Today I will try to use the same dialectic ( as previously done in the article...
Davide Cavallini - November 17, 2025
Spy Apps: How Spyware Works and Why It’s a Privacy Risk Cyber News

Spy Apps: How Spyware Works and Why It’s a Privacy Risk

Spyware (also known as spy apps) represent one of the most insidious and dangerous threats of the digital age. These...
Silvia Felici - November 17, 2025
Nuclear power entirely in the hands of AI! And what if there’s an accident? Cyber News

Nuclear power entirely in the hands of AI! And what if there’s an accident?

In the technological field, the idea that the future development of generating systems depends inexorably on the expansion of nuclear...
Redazione RHC - November 17, 2025

Goodbye Microsoft Word. China chooses WPS Office for official documents

China continues to pursue technological independence, and this time the signal has come not from microchip manufacturers, but from government officials. For the first time, the Chinese Ministry of Commerce...

Spyware yes, spyware no: it’s just a prospect! NSO Group is now under US control.

Israeli company NSO Group, developer of the infamous Pegasus spyware , recently came under the control of American investors. A company spokesperson announced that the new funding amounts to tens...

Towards “legal technology”: legal education in the digital age must be technological.

As a criminal lawyer and professor of Criminal Computer Law, a student of the late Vittorio Frosini, a pioneer of legal informatics in Italy, I constantly reflect on the state...

The AI bubble: fears of a new technological meltdown grow

At DevDay, OpenAI's annual conference this week, CEO Sam Altman took questions from reporters, an increasingly rare occurrence among tech leaders. Altman acknowledged the uncertainty surrounding the AI industry today,...

Crimson Collective claims alleged Nintendo hack: bluff or real breach?

This time, hackers are targeting Nintendo , the historic Japanese video game company that has been tooth and nail for decades defending its intellectual property and the industrial secrets that...

Critical vulnerabilities in Microsoft Defender for Endpoint: security risks

Security flaws have been discovered in network communication between Microsoft Defender for Endpoint (DFE) cloud services , allowing attackers, following a breach, to bypass authentication, manipulate data, release sensitive information,...

Between AI and fear, Skynet teaches: “We’ll build bunkers before launching AGI.”

The quote, “We’ll definitely build a bunker before we launch AGI,” that inspired the article, was attributed to a Silicon Valley leader, though it’s unclear who exactly he meant by...

China dominates industrial robotics: 2 million machines in factories

China is consolidating its position as a global manufacturing powerhouse thanks to an unprecedented pace of production and installation of industrial robots. According to a report by the International Federation...

RDP Services Exposed in the Crosshairs! A Botnet of 100,000 IPs Scans the Network

In the United States, a large-scale, coordinated botnet campaign is targeting Remote Desktop Protocol (RDP)-based services. The scale and organizational structure of this campaign poses a significant threat, especially for...

Artificial intelligence = Alcohol for teens! It damages social and cognitive skills

Today's students are increasingly turning to artificial intelligence, not only for study aids, but also for social interaction and emotional support. A new study from the Center for Democracy and...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE