Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Crowdstriker 970×120
Precedente Successivo

Latest news

Cyberstalking Against Women: Analysis and Legal Implications Cybercrime

Cyberstalking Against Women: Analysis and Legal Implications

This is the third in a series of articles analyzing gender-based violence in the digital context, in anticipation of November...
Paolo Galdieri - November 4, 2025
Hanyuan-1: China’s room-temperature quantum computer challenges the US Cyber News

Hanyuan-1: China’s room-temperature quantum computer challenges the US

China's first atomic quantum computer has reached a major commercial milestone, recording its first sales to domestic and international customers,...
Redazione RHC - November 3, 2025
The Louvre Theft: How Password Governance Can Undermine Security Cyber News

The Louvre Theft: How Password Governance Can Undermine Security

"When the Key Is 'Louvre' - The Theft That Teaches How Password Governance Can Shake Even the Most Violable Fortresses"...
Pietro Melillo - November 3, 2025
Xi Jinping proposes a global organization for artificial intelligence Cyber News

Xi Jinping proposes a global organization for artificial intelligence

Chinese President Xi Jinping took center stage at Saturday's APEC leaders' meeting, proposing the creation of a global organization to...
Luca Vinciguerra - November 3, 2025
The Future of Society in the Age of Artificial Intelligence Cybercrime

The Future of Society in the Age of Artificial Intelligence

Today, many are wondering what impact the spread of Artificial Intelligence will have on our society. Among the most widespread...
Ugo Micci - November 3, 2025
When Google Indexes Even Deception! Ghost Networks Discovered by RHC That Penalize SERPs Cyber News

When Google Indexes Even Deception! Ghost Networks Discovered by RHC That Penalize SERPs

RHC analysis of the “BHS Links” network and global Black Hat automated SEO infrastructure An internal Red Hot Cyber analysis...
Redazione RHC - November 3, 2025

The ChillyHell backdoor returns to threaten macOS systems.

Researchers have reported a new surge in activity for ChillyHell, a modular backdoor for macOS that was thought to be dormant for years, but which appears to have infected computers...

Regulating out-of-office work: a best practice for organizations and beyond.

When talking about information security, we must first take a breath and realize that we need to dive deeper than just computer systems and directly expressed information. It concerns all...

Apple introduces Memory Integrity Enforcement. Will this be the end of hacking?

Apple officially introduced Memory Integrity Enforcement, a new memory protection system that the company calls the most significant advancement ever made in consumer operating system security. It took five years...

Happy Birthday, Super Mario Bros.! 40 years of a game that revolutionized the world.

It's been exactly four decades since the release of the legendary Super Mario Bros., a project that changed the video game industry forever and became the symbol of an entire...

China Makes Historic Turn: Mandatory Labeling of AI-Created Content

A series of Chinese national standards came into force on September 1st, aimed at redefining rules, responsibilities, and controls in increasingly strategic technology and consumer sectors. The State Administration for...

Attention seniors! Ruthless hacker scam: Criminal hackers steal your life savings.

According to the New York State Attorney General's Office, the primary target of criminal hackers is the elderly and those close to that age. The criminal scenario usually begins with...

Quantum algorithm solves complex mathematical problem

Researchers have used a quantum algorithm for the first time to solve a complex mathematical problem that for over a century was considered insurmountable even for the most powerful supercomputers....

Sentenced to 4.5 years for piracy: he sold DVDs and films online.

A U.S. court sentenced a Memphis resident to four and a half years in prison for selling digital copies of movies before their official release. Steven R. Hale, 37, who...

Samsung releases September 2025 security patch, fixing critical vulnerabilities.

A September 2025 security update has been released by Samsung to address a critical zero-day vulnerability that is currently being actively exploited. This patch includes fixes for a total of...

Villager: The Kali Linux and DeepSeek Attack Tool That’s Alarming Experts

The experts at Straiker have announced a new tool called Villager, which has been downloaded nearly 10,000 times from the official PyPI repository since its release in July. The program...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE