Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Fortinet 970x120px
Precedente Successivo

Latest news

ClayRat: The spyware that targets Android users with self-propagation Cyber News

ClayRat: The spyware that targets Android users with self-propagation

The ClayRat spyware campaign is expanding rapidly and increasingly targeting Android users. According to Zimperium, the malware is actively spreading...
Bajram Zeqiri - October 29, 2025
Be careful what you tell AI! It could be confidential data Cybercrime

Be careful what you tell AI! It could be confidential data

In an age where every question is answered with a simple tap, we users have perhaps gotten a little too...
Filippo Boni - October 29, 2025
Europe vs. Silicon Valley: “AI First” kicks off in Turin with von der Leyen Cybercrime

Europe vs. Silicon Valley: “AI First” kicks off in Turin with von der Leyen

Von der Leyen launches "AI First" at Italian Tech Week: three obstacles to overcome and a €2 billion startup lost...
Carlo Denza - October 28, 2025
“YOU ARE WORTH IT, YOU’RE NEVER TOO YOUNG TO CHANGE THE WORLD”: Nicola Bellotti’s vision Cybercrime

“YOU ARE WORTH IT, YOU’RE NEVER TOO YOUNG TO CHANGE THE WORLD”: Nicola Bellotti’s vision

We often try to explain the hybrid, simultaneous, and contradictory world in which young people live in perpetual connection, but...
Olivia Terragni - October 28, 2025
Gemini 3.0 Pro: What people who are trying it say Cyber News

Gemini 3.0 Pro: What people who are trying it say

In recent days, a select few users have reported having access to the new Gemini 3.0 Pro model. Initial impressions...
Redazione RHC - October 28, 2025
From Body to Screen: How Sexual Abuse Has Moved to the Digital World Cybercrime

From Body to Screen: How Sexual Abuse Has Moved to the Digital World

This is the second in a series of articles analyzing gender-based violence in the digital context, in anticipation of November...
Paolo Galdieri - October 28, 2025

Underwater warfare is upon us! Will Chinese cable cutters pose a global threat?

The new cable cutter, developed by the China Shipbuilding Research Center, is designed for use on advanced submarines such as the Fengdou and Haidou series. The device is capable of...

$16 billion in stolen Apple, Meta, and Google credentials up for sale for $121,000

The Darklab team, Red Hot Cyber's community of threat intelligence experts, has identified an ad on the dark web marketplace "Tor Amazon", the criminal counterpart of the popular e-commerce site...

The European Union General Court “upholds” the transfer of personal data to the United States. For now

April 1st wasn't an April Fool's joke: the first hearing in the Latombe v. Commission case was adjourned to September 3rd for a ruling on the appeal filed for the...

Android Colabrodo Edition: 120 vulnerabilities and two zero-days fixed

Google developers have released security updates for Android that address 120 operating system vulnerabilities. Two of these vulnerabilities, according to the company, have already been exploited by hackers in targeted...

New Wave of Quishing Attacks: Innovative Tactics from Cybercriminals

In recent years, a particularly insidious form of phishing has become widespread: Quishing or QRishing, a strategy based on the use of QR codes containing malicious links that, once scanned,...

Netshacker: Retrogaming e Hacking Reale su Commodore 64

In the Commodore 64 gaming landscape, Netshacker stands out as a project that challenges the conventions of modern gaming, taking gamers back to the roots of 1980s home computing. This...

Trump meets with all the AI tech leaders at the White House. Elon Musk is notably absent!

Today, Thursday, September 4, 2025, US President Donald Trump will host over two dozen technology and business leaders for a dinner in the newly renovated White House Rose Garden. An...

Red Hot Cyber Conference 2026: Sponsorships Open for the Fifth Edition in Rome

The Red Hot Cyber Conference has become a regular event for the Red Hot Cyber community and for anyone working in or interested in the world of digital technologies and...

Microsoft Introduces POML for Orchestrating LLM Prompts

Microsoft today introduced POML (Prompt Orchestration Markup Language), a new markup language for prompt orchestration and specifically designed to enable rapid and structured prototyping of large language models (LLMs). POML...

CISO vs. DPO: Collaboration or Cold War in Business?

Managing security is far from simple, it's not something that can be standardized, and above all, it can't be achieved through "solutions." It requires planning, analysis, and the ability to...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE