Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

UtiliaCS 970x120
Precedente Successivo

Latest news

Veeam Analysis: Ransomware Payments Decline, But Data Resilience Remains Critical for EMEA Enterprises Cyber News

Veeam Analysis: Ransomware Payments Decline, But Data Resilience Remains Critical for EMEA Enterprises

Beyond backup: Businesses need cyber resilience, data portability, secure cloud storage, and hybrid cloud protection . Data from the Veeam...
Redazione RHC - November 17, 2025
The History of GPS: The History of Satellite Navigation Cyber News

The History of GPS: The History of Satellite Navigation

It's amazing how far we've come with satellite navigation in the last 40 years. GPS (Global Positioning System) is one...
Silvia Felici - November 17, 2025
16 Years of Go: An Innovative and Scalable Programming Language Cyber News

16 Years of Go: An Innovative and Scalable Programming Language

In November 2025, the Go programming language turned 16 years old. It was released publicly on November 10, 2009 ,...
Redazione RHC - November 17, 2025
Google is ready to launch Gemini 3.0: will it really be the turning point in the AI race? Cyber News

Google is ready to launch Gemini 3.0: will it really be the turning point in the AI race?

Google is getting closer to the official unveiling of Gemini 3.0 , the new artificial intelligence model destined to represent...
Redazione RHC - November 16, 2025
The Louvre was deceived by two Belgian pranksters! They hung their painting next to the Mona Lisa. Cyber News

The Louvre was deceived by two Belgian pranksters! They hung their painting next to the Mona Lisa.

Louvre security is under fire again after pranksters managed to trick guards and hang their painting in the same room...
Redazione RHC - November 16, 2025
Are Black Hackers Demanding Ransom? Checkout.com Responds: We Fund Those Hunting You Cyber News

Are Black Hackers Demanding Ransom? Checkout.com Responds: We Fund Those Hunting You

Payment service Checkout.com was the victim of an extortion attempt: the ShinyHunters group claimed to have accessed company data and...
Bajram Zeqiri - November 16, 2025

Velociraptor used in active attacks to distribute LockBit and Babuk ransomware

Hackers have begun using Velociraptor , the digital forensics and incident response (DFIR) tool, to launch LockBit and Babuk ransomware attacks. Cisco Talos researchers attribute these campaigns to the Storm-2603...

RondoDox Botnet Discovered: Thousands of Devices at Risk

A large botnet called RondoDox has been discovered exploiting 56 vulnerabilities in more than 30 different devices, including bugs first demonstrated during the Pwn2Own hacking competition. Attackers target a wide...

Microsoft Defender incorrectly flags SQL Server 2019 as End of Life

We know that product end-of-life (EoL) brings security risks and the accumulation of vulnerabilities, as manufacturers stop releasing corrective patches. However, starting a replatforming process five years early seems like...

The Truth About Windows XP License Key: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8

On October 10, new revelations emerged regarding one of the most notorious license keys in computing history: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8 , tied to Windows XP . For years, this character sequence has...

Intel and NVIDIA: From Historic Rivals to Partners in the New Artificial Intelligence Market

During an interview with Mad Money host Jim Cramer, NVIDIA CEO Jen-Hsun Huang recalled a key moment from his time with Intel. The interview, reported on October 9 by Fast...

Salesforce refuses to pay ransom for Scattered Lapsus Hunters attacks

Salesforce representatives have announced that they have no intention of negotiating or paying a ransom to the attackers responsible for a series of large-scale attacks that resulted in the theft...

Tetris: The game that challenges the limits of modern supercomputers

First released in 1984 by Russian programmer Alexey Pajitnov , Tetris quickly became a global phenomenon. Born as digital entertainment, the puzzle game has captivated hundreds of millions of people...

Oracle E-Business Suite Zero-Day Attack: Clop Exploits CVE-2025-61882

Last week, Oracle warned customers of a critical zero-day vulnerability in its E-Business Suite (CVE-2025-61882), which allows remote execution of arbitrary code without authentication. It has now been revealed that...

I Want It All! ChatGPT Ready to Become an Operating System

When Nick Turley joined OpenAI in 2022 to lead the ChatGPT team, he was tasked with transforming enterprise research into a commercial product. He has accomplished this mission remarkably well:...

Italian ethical hackers top the podium at the European Cybersecurity Challenge 2025.

From 6 to 9 October 2025, Warsaw hosted the 11th edition of the European Cybersecurity Challenge (ECSC) . In a close competition among 39 teams from EU member states, EFTA...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE