Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

UtiliaCS 970x120
Precedente Successivo

Latest news

Oracle VirtualBox Vulnerability: Risk of Virtual Machine Escape Cyber News

Oracle VirtualBox Vulnerability: Risk of Virtual Machine Escape

BI.ZONE specialists have identified two vulnerabilities (CVE-2025-62592 and CVE-2025-61760) in Oracle VirtualBox. When combined, they allowed an attacker to exit...
Massimiliano Brolli - October 26, 2025
BreachForums Resurrects After Yet Another FBI Shutdown Cyber News

BreachForums Resurrects After Yet Another FBI Shutdown

We've often quoted this phrase: "Fighting cybercrime is like pulling weeds: if you don't completely eradicate them, they'll grow back,...
Redazione RHC - October 26, 2025
Gemini 3.0 Pro: Google prepares for the generational leap and aims to surpass GPT-5 and Claude 4.5 Cyber News

Gemini 3.0 Pro: Google prepares for the generational leap and aims to surpass GPT-5 and Claude 4.5

Over the past few days, some users have received a notification saying that their Gemini Advanced devices have been "upgraded...
Redazione RHC - October 25, 2025
Neolix raises $600 million for autonomous driving in urban logistics Cyber News

Neolix raises $600 million for autonomous driving in urban logistics

Chinese startup Neolix , specializing in Level 4 autonomous vehicles for urban deliveries, announced on October 23 that it has...
Redazione RHC - October 25, 2025
Supercomputing power in a refrigerator: the BIE-1 revolution Cyber News

Supercomputing power in a refrigerator: the BIE-1 revolution

On October 24, the world's first human-inspired intelligent computing system, the "BI Explorer BIE-1," was officially unveiled at the Guangdong-Macao...
Redazione RHC - October 25, 2025
AVKiller + HeartCrypt: The Combo That Opens the Door to Ransomware Cybercrime

AVKiller + HeartCrypt: The Combo That Opens the Door to Ransomware

A tool has appeared on the cybercriminal market that has quickly become a mass-produced weapon for dozens of groups. It's...
Redazione RHC - October 25, 2025

The Battle Between OnlyFans and Google: Piracy, AI, and the Chaos of Automated Copyright

The massive clash between adult content creators and pirates, now transferred to automated copyright protection systems, is beginning to radically change the face of the Internet. Every day, it becomes...

Nearly a third of web traffic is generated by bots! The era of invasive AI is now

Yesterday, the Red Hot Cyber website was inaccessible for about an hour. But what's going on, we wondered? After a series of analyses, here's the result: the internet is changing...

Zscaler Data Breach: Lessons Learned About the Evolution of SaaS Threats

Zscaler's recent confirmation of a data breach resulting from a supply chain attack provides a case study in the evolution of threats against complex SaaS ecosystems. The attack, attributed to...

Zscaler Suffers Data Breach: Supply Chain Attack Via Salesloft Drift

A large-scale cyberattack has targeted security firm Zscaler, which has officially confirmed it was the victim of a supply chain breach. This attack exposed customer contact data due to compromised...

The new cybersecurity battlefield? Your brain!

Welcome to the first installment of our series, a three-week journey exploring the extraordinary dance between coevolution, cybersecurity, and the humanities, with a focus on coaching. Each week, we'll tackle...

Wikipedia under the US Congress’s scrutiny: when freedom of expression becomes “under special surveillance”

On August 27, 2025, the Wikimedia Foundation, which operates Wikipedia, received an official letter from the Committee on Oversight and Government Reform of the United States House of Representatives.The letter,...

From AI chatbots to global data theft: The Drift flaw rocks Google Workspace.

Last week, it emerged that criminal hackers had compromised the sales automation platform Salesloft and stolen OAuth and update tokens from customers in its AI agent Drift, designed to integrate...

Confidentiality vs. Privacy: The Concept Everyone Confuses (and Why It’s Dangerous)

Every day we hear about privacy in every aspect of our lives, so much so that the term has entered common parlance. But what does it really mean? What happens...

Tea Dating App Data Breach: 72,000 Images and Over 1 Million Private Messages

The "Tea Dating Advice" app reported a data breach on July 25, 2025, involving 72,000 images of users registered before February 2024, including 13,000 selfies and documents uploaded for account...

QNAP releases security patches for critical vulnerabilities in VioStor NVR systems.

QNAP Systems has released security updates to address several vulnerabilities in the QVR firmware of its VioStor Network Video Recorder (NVR) systems. On August 29, 2025, two serious security vulnerabilities...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE