Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Banner Ransomfeed 970x120 1
Precedente Successivo

Latest news

The Illicit Distribution of Intimate Images: A Threat to Women’s Freedom Culture

The Illicit Distribution of Intimate Images: A Threat to Women’s Freedom

This is the fourth in a series of articles analyzing gender-based violence in the digital context, in anticipation of November...
Paolo Galdieri - November 10, 2025
Artificial intelligence surpasses humans, but not in every field. Is AGI near or far away? Cyber News

Artificial intelligence surpasses humans, but not in every field. Is AGI near or far away?

According to experts, humanity has entered a new stage in the development of artificial intelligence: an era in which systems...
Luca Vinciguerra - November 10, 2025
Techno-optimism vs. the power of control: are we the greatest threat from AI? Cybercrime

Techno-optimism vs. the power of control: are we the greatest threat from AI?

Imagine a futuristic city split in half: on one side, glittering towers of innovation; on the other, chaos and the...
Olivia Terragni - November 9, 2025
Domestic robots and privacy: the hidden price of the automated future Cybercrime

Domestic robots and privacy: the hidden price of the automated future

The home of the future is full of robots. Automated laundries, personal assistants, and small electronic housekeepers are all devices...
Luca Galuppi - November 9, 2025
The tale of the Mayor who thought of banning axes… but then came the Saws Cyberpolitics

The tale of the Mayor who thought of banning axes… but then came the Saws

Once upon a time, there was a town that had a Magical Forest. It was happy to have it, even...
Stefano Gazzella - November 9, 2025
WhatsApp used to spread LANDFALL, the new spyware for Android Samsung Cyber News

WhatsApp used to spread LANDFALL, the new spyware for Android Samsung

Researchers at Palo Alto Networks Unit 42 have discovered a new, previously unknown family of Android spyware called LANDFALL ....
Bajram Zeqiri - November 9, 2025

PureVPN on Linux: Researcher Finds Security and Anonymity Issues

An independent researcher named Andreas, who runs the blog Anagogistis , has discovered serious vulnerabilities in Pure VPN's Linux clients that compromise basic anonymity and traffic security. The issues affect...

Ally Solos AI Glasses for the Visually Impaired: Autonomy and Safety

Envision’s Ally Solos AI glasses are a breath of fresh air for people with visual impairments, helping them read , orient themselves and understand their surroundings without the constant assistance...

First malware with integrated GPT-4 discovered: MalTerminal arrives

SentinelLABS researchers have discovered what they describe as the first known example of malware with integrated LLM functionality , dubbed MalTerminal . The discovery was presented at LABScon 2025 ,...

The winners of the AI race? Electricians and plumbers.

In an interview with Channel 4 News, Nvidia CEO Jensen Huang said that in the race to succeed in the AI era, "the big winners will be electricians and plumbers."...

SonicWall warns customers to change credentials after security breach

SonicWall has warned its customers to change their login credentials as soon as possible. A cyberattack on MySonicWall accounts compromised firewall configuration backup files. SonicWall reports that, after the incident...

Major DarkForums Leak: 196 Italian Sites Exposed with Clear FTP Credentials

On September 20, 2025, at 11:52 PM, a thread titled “FRESH FTP LEAK” appeared on DarkForums , posted by user Hackfut . The material allegedly exposed access to FTP servers...

Discipline your email first so you don’t regret it later

Managing employee email inboxes is often overlooked by organizations, despite the widespread use of email and its significant impact on privacy and security . Despite being a work tool, an...

Mathematical Security: From Number Theory to Hacking and Pentesting

When we talk about cybersecurity, we immediately think of firewalls, malware, and zero-day exploits. But there's a deeper level, unseen and unsurpassed: the laws of mathematics. Because while software can...

Elon Musk unveils Colossus II, the one-gigawatt AI supercomputer

Elon Musk shared a photo of the complex housing Colossus II, the world's first gigawatt-scale AI cluster. Elon Musk has previously stated that the Colossus 2 supercomputer, developed by xAI,...

Hackers don’t want to save you: they want to erase you.

Hackers are increasingly targeting backups – not systems or servers, but the data that companies retain for a limited period of time so they can recover from attacks. A new...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE