Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

970x120 Olympous
Precedente Successivo

Latest news

China under surveillance: Users sanctioned for spreading fake news online Cyber News

China under surveillance: Users sanctioned for spreading fake news online

In recent months, Hainan public security authorities have launched investigations and imposed administrative sanctions against several internet users responsible for...
Redazione RHC - October 3, 2025
Criminal Hackers Target Seniors! Datzbro Arrives: Facebook and Smartphones Targeted Cyber News

Criminal Hackers Target Seniors! Datzbro Arrives: Facebook and Smartphones Targeted

A new malicious campaign is using Facebook as a vehicle to spread Datzbro , an Android malware that combines the...
Sandro Sana - October 3, 2025
100 bug researchers, $32 million! HackerOne: AI bugs are on the rise! Cyber News

100 bug researchers, $32 million! HackerOne: AI bugs are on the rise!

Vulnerability bounty platform HackerOne reported that white hat hackers worldwide received $81 million in compensation over the past 12 months....
Agostino Pellegrino - October 3, 2025
Beyond the Screen: The Postal Police Event for a Healthy Life Beyond Social Media Cybercrime

Beyond the Screen: The Postal Police Event for a Healthy Life Beyond Social Media

The Red Hot Cyber Community had the opportunity to participate in "Beyond the Screen," the Postal Police's important initiative for...
Marcello Filacchioni - October 3, 2025
They’re offering you €55,000 for access to your office account. What should you do? Cyber News

They’re offering you €55,000 for access to your office account. What should you do?

BBC journalist Joe Tidy found himself in a situation usually hidden in the shadows of cybercrime. In July, he received...
Redazione RHC - October 3, 2025
Work and artificial intelligence: rising salaries for those who use AI? Cyber News

Work and artificial intelligence: rising salaries for those who use AI?

The debate over artificial intelligence applied to the world of work is currently intensifying, a clear sign of how digital...
Luca Vinciguerra - October 3, 2025

AI will end the traditional software industry just as the Internet has changed traditional media.

Generative AI, including tools like Cursor and ClaudeCode, are dramatically reducing the cost and time of software development. What once cost hundreds or thousands of dollars per token can now...

Critical Vulnerability in the Linux Kernel: A New Privilege Escalation

A critical double-free vulnerability has been discovered in the pipapo set module of the NFT subsystem of the Linux kernel. An unprivileged attacker can exploit this vulnerability by sending a...

RHC interviews Sector16, one of the most active hacktivist groups of 2025. “Let’s destroy the present for a better future”

In recent months, two disturbing episodes have shaken public opinion and the Italian cybersecurity sector. The first concerned an Italian hospital, violated in its most sensitive heart: videos of patients...

AI Agents: The Intelligent Revolution Explained to Everyone

Imagine a digital assistant who not only answers your questions, but also acts for you, plans strategies, learns from its mistakes, and collaborates with others to solve complex problems. This...

Is the end of state-led cyberspace invasions coming? The 56-page draft prepared by the UN

The eleventh final session of the Open-Ended Working Group (OEWG) on cybersecurity opened at the United Nations Headquarters in New York on July 7. The group was created in 2019...

Claude Shannon: Father of Cryptography and Founder of the Information Age

Whoever has as a mission, to deal with computer security and therefore also with cryptography, must necessarily pass through the figures of two giants of the last century. We are...

Who are the most famous hackers in history?

We often talk about hackers, but who are the famous hackers that ever existed? Considered by many as eccentric geniuses and computer wizards, by others they have the appearance of...

Underwater cables and the “cyber war of the seabed”. Between control, geopolitics and technology

Author: 5ar0m4n Publishing Date: 11/7/2021 We have often addressed the topic of undersea cables on RHC where we talked about the first submarine cable in history and the last one...

Pig Butchering Scam: How Pig Slaughter Is Becoming an Emotional Addiction Scam

In the interconnected labyrinth of the 21st century, where the desire for authenticity and the search for opportunity dance on the edge of paradox, a dark phenomenon emerges that challenges...

Human Replatforming! Artificial Intelligence Threatens Half of Jobs

The chairman of the American car company Ford, Jim Farley, has released a statement sharp on the future of the job market in the age of artificial intelligence. According to...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE