Welcome to Red Hot Cyber | Cybersecurity News
Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
TM RedHotCyber 320x100 042514
2nd Edition GlitchZone RHC 970x120 2

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

From online fraud to organ trafficking. South Korea repatriates citizens from Cambodia.

South Korea has launched a repatriation operation for its citizens from Cambodia, following reports of kidnappings, violence and the death...
Redazione RHC - 17 October 2025

Bus becomes travelling museum of retro computers in UK

In the UK, father and son Jason and Luke Stoner have transformed an old school bus into a traveling museum...
Redazione RHC - 16 October 2025

A computer science degree is no longer a guarantee of employment. AI is stealing jobs (and interviews).

Once upon a time, a degree in computer science was a guarantee of success. Competitive salaries, generous benefits, and immediate...
Redazione RHC - 16 October 2025

The era of one-handed supercomputers is upon us! GIGABYTE ATOM: A petaflop and 128GB of AI storage.

On October 15, in addition to the much-vaunted NVIDIA DGX Spark solution, created in collaboration between NVIDIA and Mediatek, another...
Redazione RHC - 16 October 2025

100 years of Italian Intelligence! Mattarella celebrates the SIM’s centenary at the Quirinale Palace

October 15, 2025 marks an anniversary of exceptional importance in the history of Italian national security: one hundred years since...
Redazione RHC - 16 October 2025

In China, robots do the cleaning: the new frontier of domestic robots

A robot capable of performing complex household tasks was unveiled at the headquarters of Hefei Zero Square Robot Co., Ltd....
Redazione RHC - 16 October 2025

Beyond espionage: “Salt Typhoon” also reportedly targeted Donald Trump

A vast Chinese cyberespionage operation, dubbed "Salt Typhoon," was recently described as the most ambitious ever attributed to Beijing. According to the report, this campaign resulted in the theft of...
Share on Facebook Share on LinkedIn Share on X

GhostRedirector: The Black SEO Redirect Campaign That Manipulates Search Engines

A cybercriminal group, dubbed GhostRedirector by ESET researchers and linked to the Chinese ecosystem, has quietly deployed a global search engine manipulation scheme based on hacked Windows hosts. According to...
Share on Facebook Share on LinkedIn Share on X

Windows: Security updates cause problems with UAC and app installation

Microsoft has announced that the August 2025 Windows security updates may cause unexpected User Account Control (UAC) prompts and issues when installing apps. The bug affects non-administrator users on all...
Share on Facebook Share on LinkedIn Share on X

Attackers are using Velociraptor for cyberattacks. Rapid7 is aware

Sophos security specialists have drawn attention to a cyberattack in which unknown attackers used the open-source forensic tool Velociraptor to monitor endpoints. "In this incident, attackers used a tool to...
Share on Facebook Share on LinkedIn Share on X

Supercomputers: Italy ranks sixth and tenth in the 2025 TOP500 rankings.

The world of supercomputers has entered the era of exascale computing. The June 2025 TOP500 ranking recorded three American systems at the top, a sensational debut from Europe, and a...
Share on Facebook Share on LinkedIn Share on X

Underwater warfare is upon us! Will Chinese cable cutters pose a global threat?

The new cable cutter, developed by the China Shipbuilding Research Center, is designed for use on advanced submarines such as the Fengdou and Haidou series. The device is capable of...
Share on Facebook Share on LinkedIn Share on X

$16 billion in stolen Apple, Meta, and Google credentials up for sale for $121,000

The Darklab team, Red Hot Cyber's community of threat intelligence experts, has identified an ad on the dark web marketplace "Tor Amazon", the criminal counterpart of the popular e-commerce site...
Share on Facebook Share on LinkedIn Share on X

The European Union General Court “upholds” the transfer of personal data to the United States. For now

April 1st wasn't an April Fool's joke: the first hearing in the Latombe v. Commission case was adjourned to September 3rd for a ruling on the appeal filed for the...
Share on Facebook Share on LinkedIn Share on X

Android Colabrodo Edition: 120 vulnerabilities and two zero-days fixed

Google developers have released security updates for Android that address 120 operating system vulnerabilities. Two of these vulnerabilities, according to the company, have already been exploited by hackers in targeted...
Share on Facebook Share on LinkedIn Share on X

Chess.com Data Breach! Free Services for Affected Users

Chess.com, the online chess giant, has reportedly suffered a data breach that exposed the personal information of 4,541 individuals, according to a filing with the Maine Attorney General's Office. The...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sito
DIG AI: The Dark Web’s New AI Tool for Cybercrime
Redazione RHC - 21/12/2025

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…

Immagine del sito
Airbus Eyes Sovereign Cloud to Mitigate US Data Risks
Redazione RHC - 21/12/2025

In recent months, a question has been emerging with increasing insistence on European corporate boards: is the US cloud really safe for all companies? Especially for those operating in strategic sectors or with economic, industrial,…

Immagine del sito
North Korean Hackers Steal $2 Billion in Crypto, Targeting DeFi Sector
Redazione RHC - 21/12/2025

In 2025, North Korean hackers stole a record $2 billion in cryptocurrency , 51% more than the previous year. However, the number of attacks has decreased, while the damage has increased. According to Chainalysis, North…

Immagine del sito
Linux Kernel CVE-2025-68260 Vulnerability Fixed: Rust Code at Risk
Redazione RHC - 19/12/2025

The world of technology is a veritable battlefield, where coding geniuses challenge malicious attackers every day with exploits and security patches. That’s why the recent discovery of a vulnerability in the Linux kernel has caused…

Immagine del sito
HPE OneView Vulnerability CVE-2025-37164: Critical Security Update Required
Redazione RHC - 18/12/2025

Cybersecurity is a serious issue, especially when it comes to vulnerabilities that can compromise an entire system. Well, Hewlett Packard Enterprise (HPE) has just raised the alarm about a truly worrying security flaw in its…