Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Heliaca 970x120 1
Precedente Successivo

Latest news

DC Comics takes a stand: “No generative AI” Cyber News

DC Comics takes a stand: “No generative AI”

DC Comics has definitively stated its position on generative AI: no machine involvement in the storytelling or illustrations . The...
Luca Vinciguerra - October 24, 2025
A “hacked” water system: hacktivism becomes digital propaganda Cyber News

A “hacked” water system: hacktivism becomes digital propaganda

In September, Forescout specialists detected a targeted attack on their honeypot server, which mimicked the control system of a water...
Bajram Zeqiri - October 24, 2025
Russia and Cybercrime: A Balance Between Selective Repression and State Interest Cybercrime

Russia and Cybercrime: A Balance Between Selective Repression and State Interest

The Russian cybercrime ecosystem has entered a phase of profound transformation, triggered by a combination of factors: unprecedented international pressure...
Ada Spinelli - October 24, 2025
Microsoft Edge protects Internet Explorer mode from attacks Cyber News

Microsoft Edge protects Internet Explorer mode from attacks

The Microsoft Edge security team made significant changes to Internet Explorer mode after receiving confirmation of targeted attacks using it....
Redazione RHC - October 24, 2025
Canada’s craft beer competition ends in chaos over AI judges Cyber News

Canada’s craft beer competition ends in chaos over AI judges

A major Canadian craft beer competition has become the center of controversy after unexpectedly introducing artificial intelligence into the beverage...
Silvia Felici - October 24, 2025
Artificial General Intelligence (AGI): the first global standard for measuring it has been defined Cyber News

Artificial General Intelligence (AGI): the first global standard for measuring it has been defined

On October 21, 2025, an international team of researchers from 29 leading institutions—including Stanford University, MIT, and the University of...
Silvia Felici - October 23, 2025

Living-off-the-Land 2.0: When Attackers Weaponize Security Tools

Sophos has warned of an increasingly sophisticated attacker practice: the use of legitimate cybersecurity tools as part of a Living-off-the-Land (LotL) tactic, in which an attack is carried out using...

What a hacker attack! Ursula von der Leyen’s plane was the victim of an electronic warfare attack (EW)

A disturbing episode of electronic warfare (EW) directly involved the President of the European Commission, Ursula von der Leyen. On approach to Plovdiv Airport in Bulgaria, the jet carrying the...

Transparency and Resilience: NIST Publishes Meta-Framework to Change Supply Chain Management

The National Institute of Standards and Technology (NIST), through its National Cybersecurity Center of Excellence (NCCoE), has introduced a decentralized data approach to help manufacturers and critical infrastructure sectors protect...

LilyGO T-Embed CC1101 and Bruce Firmware, the community makes studying Rolling Code possible

Research into radio frequency security never stops. In recent years, we've seen the emergence of increasingly accessible tools that have brought the world of RF hacking beyond academic laboratories. One...

DarkMirror H1 2025 Released: Dark Lab’s Ransomware Threat Report

Ransomware continues to represent one of the most pervasive and damaging threats in the global cybersecurity landscape. In the regular "DarkMirror" report produced by Red Hot Cyber's DarkLab intelligence laboratory,...

Tesla under fire! The hacker hired by the victims recovers data deleted in the fatal crash.

An independent hacker has uncovered hidden data related to a fatal accident involving a Tesla in Florida in 2019, reigniting the debate over the automaker's transparency and setting an unprecedented...

Fiber Computers Are Coming! E-textiles Are Coming, the Smart Fabric Revolution

Scientists have assembled the key elements of a computing system into a single, flexible, and even machine-washable thread. The idea is to weave many of these threads into fabric to...

GitHub and GitLab are increasingly under fire! Targeted attacks targeting developers via fake repositories

By hosting fake projects on popular development platforms (GitHub and GitLab), attackers trick users into running malicious payloads that pull add-ons from a hacker-controlled repository. As a result, remote access...

Amazon Stops APT29: Sophisticated Russian Watering Hole Campaign Foiled

A complex watering hole campaign, orchestrated by the notorious hacker group APT29, linked to Russian foreign intelligence services, was neutralized by Amazon's cybersecurity team. This latest campaign marks a significant...

Google warns 2.5 billion Gmail users: account security at risk. Reset your password!

A far-reaching security advisory has been issued by Google to the 2.5 billion users of its Gmail service, aiming to strengthen the protection of their accounts following a data breach...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE