Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Heliaca 970x120 1
Precedente Successivo

Latest news

Who invented the World Wide Web? The story of Timothy Berners-Lee, the genius behind the web Cyber News

Who invented the World Wide Web? The story of Timothy Berners-Lee, the genius behind the web

We all use the internet every day, at all hours, our smartphone has become an active prosthesis of our body,...
Silvia Felici - November 11, 2025
Marketing is nothing! VPNs sell themselves every time a government blocks adult sites Cyber News

Marketing is nothing! VPNs sell themselves every time a government blocks adult sites

Hundreds of millions of smartphone users have faced blocking of pornographic websites and mandatory age verification. The UK has introduced...
Sandro Sana - November 11, 2025
The extraordinary story of Alan Turing, the father of computer science: from his tumultuous childhood to his revolutionary contributions Cybercrime

The extraordinary story of Alan Turing, the father of computer science: from his tumultuous childhood to his revolutionary contributions

Madras, early 1900s. The British Empire dominates India. Julius, a history graduate from Oxford University, serves as a colonial administrative...
Carlo Denza - November 11, 2025
The Windows 98 Blue Screen of Death That Changed Microsoft’s Plans Cyber News

The Windows 98 Blue Screen of Death That Changed Microsoft’s Plans

It was April 20, 1998. Microsoft was so embarrassed by the iconic Windows 98 blue screen of death on stage...
Redazione RHC - November 11, 2025
21 Years of Firefox: A History of Innovation and Independence Cyber News

21 Years of Firefox: A History of Innovation and Independence

November 9th marked the 21st anniversary of Firefox 1.0. In 2004, it was the first stable release of Mozilla's new...
Silvia Felici - November 10, 2025
The Illicit Distribution of Intimate Images: A Threat to Women’s Freedom Culture

The Illicit Distribution of Intimate Images: A Threat to Women’s Freedom

This is the fourth in a series of articles analyzing gender-based violence in the digital context, in anticipation of November...
Paolo Galdieri - November 10, 2025

From Debugging to Breaking: Turning Crash Dumps into EDR Kill Switches

I have been working for several years as a System Engineer, and one of the tasks I handled was managing Citrix PVS. One of the issues with PVS was investigating...

Chrome for Android: From a “wall of text” to a podcast is a short step.

Google has added a new AI-powered feature to Chrome for Android for reading web pages. Instead of reading the entire text aloud, the browser can summarize the material in a...

Developers safe: Mozilla introduces Firefox extension rollback feature.

Mozilla has introduced a new feature for Firefox add-on developers that allows them to quickly revert to a previously approved version and fix critical issues in situations where fixing and...

ClickFix: The Scam That Tricks Mac Users into Installing the AMOS Trojan

Cybercriminals have launched a large-scale campaign against macOS users, disguising malware as popular programs. LastPass reported this, having discovered that its product had also been spoofed . The malware is...

The DDoS King is here! 40 seconds at 22.2 terabits mitigated by Cloudflare

Cloudflare has announced that it independently managed an unprecedented Distributed Denial-of-Service (DDoS) attack, the largest ever seen. The hypervolumetric attack reached an unprecedented peak of 22.2 terabits per second (Tbps)...

Cyberwar in Italy: The government brings the army into cyberspace.

Cyberspace is no longer a marginal dimension but a true strategic operational domain. Its relevance is now comparable to that of land, sea, air, and space. Technological acceleration driven by...

Apple attacks Google Chrome: “Switch to Safari to protect your privacy.”

Apple has issued a stern warning: stop using Google Chrome. The world's most popular browser is competing with both desktops and smartphones, gradually taking market share from Apple. But the...

AI in the Hands of Criminal Hackers: The Game Has Changed, and We’re at a Disadvantage

In recent months, during my research and studies, I have come across a reality as surprising as it is worrying: how easily it is possible to identify exposed systems on...

Samsung under attack in Italy: phones held hostage by ransomware

For a few days now, news has been circulating, which I don't think has been confirmed by official sources, of a ransomware attack carried out through Samsung's "corporate fleet" management...

PureVPN on Linux: Researcher Finds Security and Anonymity Issues

An independent researcher named Andreas, who runs the blog Anagogistis , has discovered serious vulnerabilities in Pure VPN's Linux clients that compromise basic anonymity and traffic security. The issues affect...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE