Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

HackTheBox 970x120 1
Precedente Successivo

Latest news

A bug in ImunifyAV antivirus leads to RCE. 56 million sites at risk. Vulnerability

A bug in ImunifyAV antivirus leads to RCE. 56 million sites at risk.

A vulnerability has been discovered in the Linux hosting ecosystem : the ImunifyAV malware scanner has been found to be...
Agostino Pellegrino - November 14, 2025
Discovering Remote Code Execution (RCE). The most feared security bug! Cybercrime

Discovering Remote Code Execution (RCE). The most feared security bug!

Of all the vulnerabilities, the most feared by victims and the most sought after by attackers is remote code execution,...
Manuel Roccon - November 14, 2025
An “autonomous” spy campaign was orchestrated by artificial intelligence Cyber News

An “autonomous” spy campaign was orchestrated by artificial intelligence

An analysis conducted in recent months had highlighted how the evolution of artificial intelligence systems was reaching a critical point...
Luca Vinciguerra - November 14, 2025
What is Misevolution: The Autonomous Evolution of AI Agents, and It’s Not Always Good Cyber News

What is Misevolution: The Autonomous Evolution of AI Agents, and It’s Not Always Good

Shanghai, November 11, 2025 – A new study conducted by the Shanghai Artificial Intelligence Laboratory , in collaboration with Shanghai...
Redazione RHC - November 13, 2025
Tanks are no longer needed: new wars are fought from a laptop Cyberpolitics

Tanks are no longer needed: new wars are fought from a laptop

Author: Roberto Villani, Tanslate: Vincenzo Marcovecchio Why will the cyberg wars, indeed the cyber-guerrillas, be more and more present and...
Roberto Villani - November 13, 2025
A 0Day bug for a WordPress plugin sold for 6000 euros in the underground Cybercrime

A 0Day bug for a WordPress plugin sold for 6000 euros in the underground

On one of Russia's most popular forums for buying and selling vulnerabilities and attack tools, the thread appeared as a...
Stefano Gazzella - November 13, 2025

China mandates AI content labels. Let’s see what’s happening.

Starting September 1, 2025, all artificial intelligence (AI)-generated content in China must be marked with an "electronic watermark," according to new legislation. The stated goal is to improve the transparency...

The “non-sensitive data” trap: the costly mistake for companies

A wonderfully widespread argument among those who work with personal data is that of underestimating the risks or refusing to address them at all. This is the belief that there's...

Discovering the Emotional Firewall! The Vulnerability No One Is Patching

There is one critical issue in the cyber arena that we have not yet patched: our emotional firewall . This is not a network problem, but a collective mental block....

Programming in crisis: Junior job openings plummet as AI transforms the workplace.

Artificial intelligence is no longer a futuristic concept from science fiction films . It is already part of our daily lives and, above all, it is revolutionizing the world of...

Work, Artificial Intelligence, and Marketing: What Skills Will We Need in 2025?

In recent years, the marketing industry has undergone a radical transformation : today, one in two positions requires artificial intelligence skills. According to representatives from the agency Digital Duke, the...

Nvidia CEO: “The gap with China is just a few nanoseconds.”

On September 25, during the interview program Bg2 Pod , Nvidia CEO Jen-Hsun Huang expressed positions that fueled heated public debate. During his speech, Huang defended the Chinese economic system,...

Goodbye, real-life stars? Here comes Tilly Norwood, the first AI actress!

In an industry once dominated by live-action stars, digital characters are increasingly gaining traction. At a summit in Zurich, actress, comedian, and technologist Ellin van der Velden announced that her...

Back to the On-Prem: Austrian Armed Forces Choose LibreOffice

In recent years, many companies have gone cloud-first , outsourcing critical infrastructure and business services to platforms managed by external providers. However, recent events and growing concerns about digital sovereignty...

Digital Crisis Management: Communication Is the Key to Success or Failure

In recent years, cyberattacks have become a major threat to businesses, regardless of industry. While technical departments focus on troubleshooting and restoring systems, the true test of an organization's ability...

Balancing speed and security! This is the real challenge of Vibe Coding.

The cybersecurity industry is undergoing a transformation: artificial intelligence is becoming not just a tool for developers, but also a weapon for attackers. And we've talked about this extensively. This...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE