Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Crowdstriker 970×120
Precedente Successivo

Latest news

WhatsApp Alert: New Malware Spreads Like a Virus Among Contacts Cybercrime

WhatsApp Alert: New Malware Spreads Like a Virus Among Contacts

Trend Micro researchers have detected a large-scale malware campaign targeting users in Brazil. It is distributed via the desktop version...
Massimiliano Brolli - October 6, 2025
ChatGPT becomes a social media platform: private messaging is coming soon. Cyber News

ChatGPT becomes a social media platform: private messaging is coming soon.

OpenAI appears to be preparing ChatGPT to become a social platform, not just a traditional AI-powered chat app. The company...
Luca Vinciguerra - October 6, 2025
25,000 kilometers, the new Seacom2.0 submarine cable to connect Europe, Africa and Asia Cyber News

25,000 kilometers, the new Seacom2.0 submarine cable to connect Europe, Africa and Asia

Seacom, an African submarine infrastructure operator, has announced the launch of Seacom 2.0 , an international cable system designed to...
Sandro Sana - October 6, 2025
Oracle E-Business Suite 9.8 Vulnerability: Urgent Updates Needed Vulnerability

Oracle E-Business Suite 9.8 Vulnerability: Urgent Updates Needed

Oracle has published a security advisory regarding a critical vulnerability identified as CVE-2025-61882 in the Oracle E-Business Suite . The...
Agostino Pellegrino - October 5, 2025
Apple in the crosshairs? Alleged 9GB data breach claim on Darkforums Cybercrime

Apple in the crosshairs? Alleged 9GB data breach claim on Darkforums

Author : Inva Malaj and Raffaela Crisci 04/10/2025 – Darkforums.st: “303” Claims 9GB Data Breach on Apple.com In the early...
Inva Malaj - October 5, 2025
When AI writes poetry: is the future of human creativity over? Cyber News

When AI writes poetry: is the future of human creativity over?

In 1950, Alan Turing, considered the father of artificial intelligence, was still wondering "Can machines think?" Today, more than seventy...
Redazione RHC - October 5, 2025

ToolShell: The New Threat Affecting Microsoft SharePoint Servers

An advanced cyberattack campaign has been detected targeting Microsoft SharePoint servers. This threat exploits a series of vulnerabilities, known as "ToolShell," which allows attackers to gain complete and remote control...

Uncle Bot, the humanoid robot that’s conquering China and scaring the US

A humanoid robot dressed in casual clothes, resembling an average man, has gained unexpected popularity in China. Nicknamed "Uncle Bot on the internet, it rose to fame thanks to a...

Viral Minds: How the Internet Turned Social Contagion Into a Global Psychological Weapon

Stop scrolling for a moment and look around you. Every meme, every viral video, every outrage-fueled hashtag, are you sure you chose them? Or did they choose you? We like...

Mercedes-Benz and Microsoft are teaming up to integrate Teams and Copilot 365 into cars starting this summer.

On July 16, Mercedes-Benz announced in a press release the expansion of its collaboration with Microsoft, introducing the latest Office solutions and collaboration tools, including an updated version of the...

What is ICT Risk Management? A process that supports cybersecurity.

ICT Risk Management is a process that identifies, assesses, and manages risks related to the use of information and communications technologies (ICT). It is a fundamental aspect for any organization...

Sophos fixes vulnerabilities in Intercept X for Windows

Sophos announced that it has resolved three separate security vulnerabilities in Sophos Intercept X for Windows and its installer. These vulnerabilities, designated CVE-2024-13972, CVE-2025-7433, and CVE-2025-7472, have been rated High...

OMGCable: The Thin Red Line Between Penetration Testing and Covert Surveillance

In 2021, during one of my explorations into the increasingly blurred boundary between hardware and cybersecurity, I wrote an article with a title that today sounds almost prophetic: “Even a...

The new version of the Konfety malware uses advanced evasion techniques

A new version of the Android malware called Konfety has become even more sophisticated: specialists at Zimperium zLabs have discovered an improved variant that uses non-standard ZIP archives and loads...

The Inconvenient Truth About Work and AI: 99% Fight, 1% Win

On July 11, local time, it was revealed that Google DeepMind had successfully "recruited" the core team of AI startup Windsurf. Not long before, OpenAI was negotiating a $3 billion...

Discovering Scattered Spider: The Criminal Threat Using Advanced Tactics and Techniques

By Cyber Defense Center Maticmind (Andrea Mariucci, Riccardo Michetti, Federico Savastano, Ada Spinelli) The Scattered Spider threat actor, UNC9344, made its appearance in 2022 with two targeted attacks on Caesars...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE