Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Crowdstriker 970×120
Precedente Successivo

Latest news

Tetris: The game that challenges the limits of modern supercomputers Cyber News

Tetris: The game that challenges the limits of modern supercomputers

First released in 1984 by Russian programmer Alexey Pajitnov , Tetris quickly became a global phenomenon. Born as digital entertainment,...
Redazione RHC - October 10, 2025
Oracle E-Business Suite Zero-Day Attack: Clop Exploits CVE-2025-61882 Vulnerability

Oracle E-Business Suite Zero-Day Attack: Clop Exploits CVE-2025-61882

Last week, Oracle warned customers of a critical zero-day vulnerability in its E-Business Suite (CVE-2025-61882), which allows remote execution of...
Agostino Pellegrino - October 10, 2025
I Want It All! ChatGPT Ready to Become an Operating System Cyber News

I Want It All! ChatGPT Ready to Become an Operating System

When Nick Turley joined OpenAI in 2022 to lead the ChatGPT team, he was tasked with transforming enterprise research into...
Luca Vinciguerra - October 10, 2025
Italian ethical hackers top the podium at the European Cybersecurity Challenge 2025. Cyber News

Italian ethical hackers top the podium at the European Cybersecurity Challenge 2025.

From 6 to 9 October 2025, Warsaw hosted the 11th edition of the European Cybersecurity Challenge (ECSC) . In a...
Silvia Felici - October 9, 2025
1,000 POS terminals from US and UK stores hacked and put up for auction: “full access” for $55,000 Cyber News

1,000 POS terminals from US and UK stores hacked and put up for auction: “full access” for $55,000

A new ad posted on an underground forum was recently spotted by researchers at the Dark Lab threat intelligence laboratory...
Redazione RHC - October 9, 2025
Microsoft 365 Outage: Thousands of Users Affected Worldwide Cyber News

Microsoft 365 Outage: Thousands of Users Affected Worldwide

A widespread outage of Microsoft 365 services affected thousands of users worldwide on the evening of Wednesday, October 8, 2025,...
Redazione RHC - October 9, 2025

The Key to Software Security: CVSS 4.0 and Vulnerability Management

How are software security vulnerabilities assessed? Is it possible to determine their severity? How can we determine the order in which to update code in the event of multiple vulnerabilities?...

What is Red Team? A journey into the world of offensive security experts.

The evolution of cyber threats is a constant in today's world. Malicious individuals, often driven by financial, ideological, or other motivations, seek new ways to overcome organizations' digital and physical...

Microsoft reduces AI’s environmental impact with human and agricultural waste.

Microsoft has decided to reduce the environmental impact of its artificial intelligence by turning to a seemingly unlikely resource: human and agricultural waste. The company has signed a contract with...

Discovering the Cyber Kill Chain. Defend your network and learn how to attack and defend yourself.

In the digital age, cybersecurity has become a priority for businesses and individuals. Among the most fearsome threats are cyberattacks, targeted intrusions that can cause significant damage, both financially and...

What is Cyber Threat Intelligence? Let’s explore a fundamental discipline in cybersecurity.

Cyber Threat Intelligence (CTI) is the practice of collecting, analyzing, and using cyber threat information to protect organizations from malicious activity. CTI has become a key element of cybersecurity, helping...

What is Open Source Intelligence (OSINT). Its importance and necessity in today’s world.

The web contains a sea of information. Between social networks, newspapers, specialized magazines, images, radio, and television... we use and produce a sea of public domain data, from which we...

What are Vulnerability Assessments? A Journey into Automated Software Vulnerability Scanning

A vulnerability assessment is a process of evaluating computer systems, networks, and applications to identify vulnerabilities that could be exploited by attackers to compromise the system's security. The primary goal...

Google is turning the web into a showcase for AI! A near-term disaster for the digital economy.

Google is turning its search engine into a showcase for artificial intelligence, and that could spell disaster for the entire digital economy. According to a new study from the Pew...

Operation Checkmate: A major law enforcement coup. BlackSuit has been apprehended!

During a coordinated international operation dubbed Operation Checkmate, law enforcement officials have dealt a major blow to the BlackSuit ransomware group (onion link here, which has fallen into the hands...

Container isolation is at risk. Just 3 lines of code to breach NVIDIA’s AI environments.

Cloud security firm Wiz has identified a critical vulnerability in the NVIDIA Container Toolkit, identified as CVE-2025-23266 and with a CVSS score of 9.0. The vulnerability, dubbed NVIDIAScape, could pose...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE