Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

UtiliaCS 970x120
Precedente Successivo

Latest news

Alleged EY Data Leak: 4TB of SQL Backups Exposed on Azure Cloud Cybercrime

Alleged EY Data Leak: 4TB of SQL Backups Exposed on Azure Cloud

In recent days, the alleged data leak by Ernst & Young (EY) has become one of the most discussed topics...
Luca Stivali - November 3, 2025
Theft at the Louvre: The surveillance system’s password “LOUVRE” has put the museum in crisis. Cyber News

Theft at the Louvre: The surveillance system’s password “LOUVRE” has put the museum in crisis.

We recently published an in-depth article on the "theft of the century" at the Louvre , in which we highlighted...
Pietro Melillo - November 2, 2025
Discover the Dark Web: Access, Secrets, and Helpful Links to the Onion Network Cybercrime

Discover the Dark Web: Access, Secrets, and Helpful Links to the Onion Network

Have you always thought that the Dark Web is frequented by cybercriminals? Have you always thought that the Dark Web...
Pietro Melillo - November 2, 2025
Robots are starting to take their place in society thanks to new AI algorithms. Cyber News

Robots are starting to take their place in society thanks to new AI algorithms.

On September 25, Google DeepMind released a video demonstrating how its humanoid platforms handle multi-step, everyday tasks using multimodal reasoning....
Redazione RHC - November 2, 2025
Google Android Protects Users from Fraud, But Watch Out on Mondays Cyber News

Google Android Protects Users from Fraud, But Watch Out on Mondays

Google has shared new data on Android's built-in protections against text and call fraud. According to the company, the system...
Redazione RHC - November 1, 2025
Android Malware Steals NFC-Enabled Credit Cards Cyber News

Android Malware Steals NFC-Enabled Credit Cards

In Eastern European countries, there has been a rapid increase in malicious Android apps that exploit contactless data transfer technology...
Massimiliano Brolli - November 1, 2025

Italy among the spyware giants! A solid third place after Israel and the US.

We're not exactly great at cybersecurity, but we're top of the class when it comes to spyware! According to an Atlantic Council study, the spyware industry is booming as investors...

Windows 11: Microsoft Revamps File Explorer with Artificial Intelligence

Microsoft has begun testing new AI-powered features in File Explorer in Windows 11. These features will allow users to interact with images and documents directly from File Explorer, without having...

CISA launches new plan to improve CVE quality and global cyber defense

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has presented the document "CISA Strategic Focus CVE Quality for a Cyber Secure Future," a strategic vision aimed at redefining the Common...

Microsoft Teams raises its defenses: real-time alerts against malicious links

To strengthen the security of its Teams platform, Microsoft will implement an automatic notification system to users regarding dangerous links in chat messages. This new feature, integrated into Microsoft Defender...

Goodbye PowerShell 2.0 and WMIC! The great Windows 11 cleanup has begun.

Windows 11 users who have installed the September 2025 Update might think that practically nothing changes. At first glance, KB5065426 looks like a normal small patch that Microsoft distributes to...

Microsoft warns: Critical vulnerabilities in Office! Users and admins at risk

On September 9, 2025, two significant vulnerabilities were discovered in Microsoft Office, for which dedicated patches were created. These vulnerabilities, if exploited by attackers, could allow malicious code to be...

Google fights misinformation: C2PA arrives on Pixel and Photos for AI image recognition.

Google announced that it will integrate C2PA Content Credentials technology into the Pixel 10 camera app and Google Photos to help users distinguish authentic images from those created or modified...

SpamGPT is here! The new phishing kit that combines AI, spam, and diabolical genius.

A new tool called SpamGPT has appeared on underground forums and has quickly become a hot topic in the cybersecurity community. The malicious software combines the capabilities of generative artificial...

Critical authentication bypass bug affects Sophos AP6

Sophos has announced that it has fixed a critical authentication bypass vulnerability affecting its AP6 series wireless access points. The flaw allowed a remote attacker to gain administrative privileges by...

An RCE in Apple CarPlay allows root access to vehicle infotainment systems

At the DefCon security conference, researchers presented a significant exploit chain that allows attackers to gain administrator permissions for vehicle entertainment systems through Apple CarPlay. The attack known as "Pwn...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE