Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Crowdstriker 970×120
Precedente Successivo

Latest news

Apache Tomcat Vulnerability: Update Now to Avoid Security Risks Vulnerability

Apache Tomcat Vulnerability: Update Now to Avoid Security Risks

Many web applications rely on Apache Tomcat, a widely used open-source Java servlet container. On October 27, 2025, Apache disclosed...
Agostino Pellegrino - October 28, 2025
Paycheck piracy is coming! And the paycheck transfer goes to criminals. Cyber News

Paycheck piracy is coming! And the paycheck transfer goes to criminals.

According to a new report from Microsoft Threat Intelligence , the financially motivated Storm-2657 group is conducting large-scale attacks against...
Marcello Filacchioni - October 28, 2025
Microsoft Teams will spy on your boss when you’re out of the office! Location tracking will be rolled out in December. Cyber News

Microsoft Teams will spy on your boss when you’re out of the office! Location tracking will be rolled out in December.

Microsoft Teams will receive an update in December 2025 that will allow you to track employee locations over your office...
Redazione RHC - October 27, 2025
Australia: Microsoft accused of deceptive practices in Microsoft 365 renewals Cyber News

Australia: Microsoft accused of deceptive practices in Microsoft 365 renewals

Australia's competition watchdog, the ACCC, said subscribers to Microsoft 365 Personal and Family plans were being asked to pay higher...
Redazione RHC - October 27, 2025
The secret behind Space Invaders’ speed? A technical limitation of the hardware Cyber News

The secret behind Space Invaders’ speed? A technical limitation of the hardware

In 1978, Taito's Space Invaders captivated audiences with its seemingly ingenious gameplay: the more aliens you shot down, the faster...
Redazione RHC - October 27, 2025
$2.8 billion in cryptocurrency stolen! Here’s how North Korea circumvents UN sanctions. Cyber News

$2.8 billion in cryptocurrency stolen! Here’s how North Korea circumvents UN sanctions.

Member countries of the international monitoring group MSMT have concluded that North Korea is increasing its use of cybercrime and...
Redazione RHC - October 27, 2025

Revolutionize security models with the Unified SASE framework

A unified and secure approach to support digital transformation, enable hybrid working, and reduce operational complexity. By Federico Saraò, Specialized System Engineer SASE, Fortinet Italy The nature of a company's...

New blackmail: if you don’t pay, we’ll feed all your data to artificial intelligence!

The hacker group LunaLock has added a new element to the classic extortion scheme, preying on the fears of artists and clients. On August 30, a message appeared on the...

Jaguar Land Rover victim of hacker attack: production halted!

Automaker Jaguar Land Rover (JLR) announced that it was forced to disable several systems due to a hacker attack. The incident appears to have impacted the automaker's manufacturing and retail...

LockBit 5.0: Signs of a New and Possible “Rebirth”?

LockBit represents one of the longest-running and most structured ransomware gangs of recent years, with a Ransomware-as-a-Service (RaaS) model that has profoundly impacted the criminal ecosystem. Following the international operation...

AI will grow by 50% and so will your anxiety about your electricity bill.

The global data center industry is preparing for a sharp increase in computing platforms for AI demands. According to Goldman Sachs, installed data center capacity will grow by approximately 50%...

Cloudflare also hacked in the Salesforce incident! Cloud risks affect everyone.

A data intrusion was detected by Cloudflare, where an experienced attacker was able to access and steal sensitive customer data from the company's Salesforce instance. The breach was part of...

Critical vulnerability in IIS Web Deploy: PoC exploit is now public

This week, a proof-of-concept exploit was published for CVE-2025-53772, a critical remote code execution vulnerability in Microsoft's IIS Web Deploy (msdeploy) tool, which has raised urgent alarms in the .NET...

OpenAI Puts Parents in Control: Parental Controls Arrive on ChatGPT

At a time when controversy over the impact of artificial intelligence on youth mental health is growing, the introduction of parental controls for ChatGPT has been announced as a measure...

Lovable, the Swedish AI unicorn that’s revolutionizing programming

This year's TechBBQ conference was packed to capacity at Copenhagen's Bella Center when Anton Osika, co-founder of the AI-powered programming app Lovable, took the stage. The fundamental concept of Lovable...

Open Data and Big Data: Data Management and a Comparison of Hadoop vs. Spark

Today, for all large companies, data represents a strategic resource of primary importance. Thanks to the information obtained, it is possible to establish decision-making strategies that, in every sector, can...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE