Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Fortinet 970x120px
Precedente Successivo

Latest news

Lenovo launches the ThinkBook Plus G6 Rollable 2025 with a rollable display. Cyber News

Lenovo launches the ThinkBook Plus G6 Rollable 2025 with a rollable display.

Tech giant Lenovo has officially started selling the ThinkBook Plus G6 Rollable 2025 , the world's first laptop with a...
Redazione RHC - October 18, 2025
Inmates hack prison: sentences reduced, funds transferred, and unauthorized visits Cyber News

Inmates hack prison: sentences reduced, funds transferred, and unauthorized visits

The Romanian penitentiary system has found itself at the center of a major digital scandal: inmates in Târgu Jiu hacked...
Stefano Gazzella - October 18, 2025
Using a VPN to watch adult content? It’ll be a crime in Wisconsin. Cyber News

Using a VPN to watch adult content? It’ll be a crime in Wisconsin.

Wisconsin authorities have decided to go further than most other US states in promoting mandatory age verification for accessing adult...
Redazione RHC - October 18, 2025
Pasquale’s Experience: A Text Message in the Heat – Session 1 Cybercrime

Pasquale’s Experience: A Text Message in the Heat – Session 1

Cybercrime is increasingly looming over the unfortunate online world. Fake profiles and scams are rampant on social networks, which, even...
Massimiliano Brolli - October 18, 2025
Inside IEEE 802.11 Wireless Networks: Wi-Fi Architecture and Signaling Cybercrime

Inside IEEE 802.11 Wireless Networks: Wi-Fi Architecture and Signaling

IEEE 802.11 wireless networks, better known as Wi-Fi, are the beating heart of modern connectivity. From a niche solution for...
Vincenzo Miccoli - October 18, 2025
WiFi: From Marconi’s Origins to the Wireless Network We Know Today Cybercrime

WiFi: From Marconi’s Origins to the Wireless Network We Know Today

Today, we live in a world where WiFi is a fundamental necessity, but how did this technology, now taken for...
RedWave Team - October 18, 2025

SQLite, Nginx, and Apache collapse in a day. Will hackers and AI agents revolutionize bug hunting?

Developing AI agents capable of identifying vulnerabilities in complex systems is still a challenging task that requires a lot of manual labor. However, these agents offer a major advantage: unlike...

The world’s first robotic womb arrives: will an android give birth to babies by 2026?

Chinese company Kaiwa Technology, based in Guangzhou, has announced its intention to create the world's first "robotic womb" by 2026: a humanoid machine with an artificial womb in its abdomen...

Is Artificial Intelligence Aiming to Eliminate the Middle Class?

On August 5, Fast Technology reported that, according to media reports, Mo Gawdat, former chief commercial officer at Google X warned that artificial intelligence (AI) will replace most workers in...

Full-on spying! The Skydweller solar drone flies for nearly three days non-stop.

The American startup Skydweller Aero has announced the successful testing of its solar drone, which spent nearly three days in flight without refueling. The device, with a wingspan larger than...

Linux 6.17 Without BCachefs Due to Community Controversy

The first version of the Linux kernel, 6.17, has been released, with no changes to the bcachefs file system. And the reason isn't due to any technical issues. On August...

Musk reveals he may lose control of Tesla

Musk recently stated publicly that his control over the company is precarious and that he "could be ousted." The controversy arose from Musk's publicly expressed concerns about his stake. Musk...

After 18 years of silence, Anne begins to speak again. The new BCI technology from the University of Berkeley

Eighteen years after a brainstem stroke left Anne Johnson almost completely paralyzed, she's now using a brain-computer interface (BCI) that converts speech directly from brain signals. In 2005, at age...

Will drones on missions be able to autonomously decide which men to kill?

It appears that the United States has already seriously considered the concept of autonomous warfare. DARPA's autonomous fighter jet, capable of unmanned combat, is no longer considered a breakthrough: the...

After the laundry, Figure 02 now folds the laundry. But for now, you’ll have to continue doing it yourself.

Just two weeks ago, the humanoid robot produced by Figure amazed us when it deftly removed clothes from a laundry basket and placed them in a washing machine. This was...

Did you respond to IT support on Teams? Congratulations! The Trojan is on your PC with rights that exceed yours.

The research team at Trustwave SpiderLabs has identified a new wave of EncryptHub attacks that combine human error and the exploitation of a vulnerability in the Microsoft Management Console. Operators...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE