Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Crowdstriker 970×120
Precedente Successivo

Latest news

Crimson Collective claims alleged Nintendo hack: bluff or real breach? Cybercrime

Crimson Collective claims alleged Nintendo hack: bluff or real breach?

This time, hackers are targeting Nintendo , the historic Japanese video game company that has been tooth and nail for...
Luca Galuppi - October 12, 2025
Critical vulnerabilities in Microsoft Defender for Endpoint: security risks Cyber News

Critical vulnerabilities in Microsoft Defender for Endpoint: security risks

Security flaws have been discovered in network communication between Microsoft Defender for Endpoint (DFE) cloud services , allowing attackers, following...
Massimiliano Brolli - October 12, 2025
Between AI and fear, Skynet teaches: “We’ll build bunkers before launching AGI.” Cyber News

Between AI and fear, Skynet teaches: “We’ll build bunkers before launching AGI.”

The quote, “We’ll definitely build a bunker before we launch AGI,” that inspired the article, was attributed to a Silicon...
Silvia Felici - October 12, 2025
China dominates industrial robotics: 2 million machines in factories Cyber News

China dominates industrial robotics: 2 million machines in factories

China is consolidating its position as a global manufacturing powerhouse thanks to an unprecedented pace of production and installation of...
Redazione RHC - October 12, 2025
RDP Services Exposed in the Crosshairs! A Botnet of 100,000 IPs Scans the Network Cyber News

RDP Services Exposed in the Crosshairs! A Botnet of 100,000 IPs Scans the Network

In the United States, a large-scale, coordinated botnet campaign is targeting Remote Desktop Protocol (RDP)-based services. The scale and organizational...
Sandro Sana - October 11, 2025
Artificial intelligence = Alcohol for teens! It damages social and cognitive skills Cyber News

Artificial intelligence = Alcohol for teens! It damages social and cognitive skills

Today's students are increasingly turning to artificial intelligence, not only for study aids, but also for social interaction and emotional...
Luca Vinciguerra - October 11, 2025

Auto-Color malware distributed via a vulnerability in SAP NetWeaver

Darktrace has recorded a targeted attack on a US chemical company, in which attackers exploited a critical vulnerability in the SAP NetWeaver platform. The threat, registered as CVE-2025-31324, consisted of...

Oscar-winning bug for macOS/iOS! An encrypted email causes the device to crash.

Can an encrypted email cause a macOS/iOS system to crash immediately? The answer is YES! This is not a science fiction plot, but a real attack, as revealed by the...

What is malware? Between science fiction, the lab, and reality.

We often talk about "Malware". But even today, many people don't fully understand the real meaning of this word. With this article, we want to explain precisely what malware is,...

What is vibe coding? Let’s discover the new frontier of programming.

"I need a system to manage my church events: volunteers, registration, community event planning.". Two weeks after writing this prompt, John Blackman, a 91-year-old retired electrical engineer, had developed a...

The secret AI race: the United States, China, and billions of dollars! And Europe? Who will win?

In recent years, global competition in AI has reached unprecedented levels, driven by massive investments: United States, China, and European Unionrespectively plan to invest billions of dollars to be first...

Happy birthday and RIP Windows 10! Ten years of Windows, from successes to failures.

It's been ten years since the release of Windows 10, the system designed to restore user confidence after the failed experiment with the Windows 8 interface. In 2015, Microsoft attempted...

Nokia under attack: database of nearly 100,000 employees appears for sale on DarkForums.

A user with the nickname Tsar0Byte posted a shocking announcement on DarkForums, one of the most well-known underground forums in the cybercrime world: the alleged compromise of sensitive data belonging...

Raven Stealer is here! The malware that steals your data by using Telegram as a “training tool.”

Amid growing activity by malicious campaigns using legitimate communication channels to bypass traditional defenses, a new tool has attracted the attention of cybersecurity specialists: Raven Stealer. This information-stealing program appeared...

AI assistants lie! After generating errors: “I was panicking.”

AI-powered programming assistants present themselves as tools capable of transforming any English text into working code. Users no longer need to know language syntax, debug commands, or understand file structures:...

What is tailgating? When penetration tests aren’t enough and the Red Team needs physical security checks.

In red teaming, the term "tailgating" refers to a technique in which a team member attempts to gain unauthorized access to a protected area or computer system, such as by...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE