Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Banner Desktop
Precedente Successivo

Latest news

Discovering Remote Code Execution (RCE). The most feared security bug! Cybercrime

Discovering Remote Code Execution (RCE). The most feared security bug!

Of all the vulnerabilities, the most feared by victims and the most sought after by attackers is remote code execution,...
Manuel Roccon - November 14, 2025
An “autonomous” spy campaign was orchestrated by artificial intelligence Cyber News

An “autonomous” spy campaign was orchestrated by artificial intelligence

An analysis conducted in recent months had highlighted how the evolution of artificial intelligence systems was reaching a critical point...
Luca Vinciguerra - November 14, 2025
What is Misevolution: The Autonomous Evolution of AI Agents, and It’s Not Always Good Cyber News

What is Misevolution: The Autonomous Evolution of AI Agents, and It’s Not Always Good

Shanghai, November 11, 2025 – A new study conducted by the Shanghai Artificial Intelligence Laboratory , in collaboration with Shanghai...
Redazione RHC - November 13, 2025
Tanks are no longer needed: new wars are fought from a laptop Cyberpolitics

Tanks are no longer needed: new wars are fought from a laptop

Author: Roberto Villani, Tanslate: Vincenzo Marcovecchio Why will the cyberg wars, indeed the cyber-guerrillas, be more and more present and...
Roberto Villani - November 13, 2025
A 0Day bug for a WordPress plugin sold for 6000 euros in the underground Cybercrime

A 0Day bug for a WordPress plugin sold for 6000 euros in the underground

On one of Russia's most popular forums for buying and selling vulnerabilities and attack tools, the thread appeared as a...
Stefano Gazzella - November 13, 2025
Triofox Antivirus Exploited to Install Remote Access Components Cyber News

Triofox Antivirus Exploited to Install Remote Access Components

Google researchers warn that hackers are exploiting a critical vulnerability in Gladinet Triofox to remotely execute code with SYSTEM privileges,...
Redazione RHC - November 13, 2025

The “non-sensitive data” trap: the costly mistake for companies

A wonderfully widespread argument among those who work with personal data is that of underestimating the risks or refusing to address them at all. This is the belief that there's...

Discovering the Emotional Firewall! The Vulnerability No One Is Patching

There is one critical issue in the cyber arena that we have not yet patched: our emotional firewall . This is not a network problem, but a collective mental block....

Programming in crisis: Junior job openings plummet as AI transforms the workplace.

Artificial intelligence is no longer a futuristic concept from science fiction films . It is already part of our daily lives and, above all, it is revolutionizing the world of...

Work, Artificial Intelligence, and Marketing: What Skills Will We Need in 2025?

In recent years, the marketing industry has undergone a radical transformation : today, one in two positions requires artificial intelligence skills. According to representatives from the agency Digital Duke, the...

Nvidia CEO: “The gap with China is just a few nanoseconds.”

On September 25, during the interview program Bg2 Pod , Nvidia CEO Jen-Hsun Huang expressed positions that fueled heated public debate. During his speech, Huang defended the Chinese economic system,...

Goodbye, real-life stars? Here comes Tilly Norwood, the first AI actress!

In an industry once dominated by live-action stars, digital characters are increasingly gaining traction. At a summit in Zurich, actress, comedian, and technologist Ellin van der Velden announced that her...

Back to the On-Prem: Austrian Armed Forces Choose LibreOffice

In recent years, many companies have gone cloud-first , outsourcing critical infrastructure and business services to platforms managed by external providers. However, recent events and growing concerns about digital sovereignty...

Digital Crisis Management: Communication Is the Key to Success or Failure

In recent years, cyberattacks have become a major threat to businesses, regardless of industry. While technical departments focus on troubleshooting and restoring systems, the true test of an organization's ability...

Balancing speed and security! This is the real challenge of Vibe Coding.

The cybersecurity industry is undergoing a transformation: artificial intelligence is becoming not just a tool for developers, but also a weapon for attackers. And we've talked about this extensively. This...

TOR Anonymizer v3.0: Advanced Digital Privacy Protection

In a digital landscape increasingly characterized by mass surveillance and indiscriminate data collection, the pursuit of online anonymity has become a primary necessity for journalists, activists, and researchers. It is...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE