Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Heliaca 970x120 1
Precedente Successivo

Latest news

Can a camera read your mind? The answer comes from Portugal. Cyber News

Can a camera read your mind? The answer comes from Portugal.

A study conducted at the Champalimode Foundation in Portugal has shown that a simple video recording is enough to "peek"...
Redazione RHC - October 2, 2025
China mandates AI content labels. Let’s see what’s happening. Cyber News

China mandates AI content labels. Let’s see what’s happening.

Starting September 1, 2025, all artificial intelligence (AI)-generated content in China must be marked with an "electronic watermark," according to...
Redazione RHC - October 2, 2025
The “non-sensitive data” trap: the costly mistake for companies Cybercrime

The “non-sensitive data” trap: the costly mistake for companies

A wonderfully widespread argument among those who work with personal data is that of underestimating the risks or refusing to...
Stefano Gazzella - October 1, 2025
Discovering the Emotional Firewall! The Vulnerability No One Is Patching Cybercrime

Discovering the Emotional Firewall! The Vulnerability No One Is Patching

There is one critical issue in the cyber arena that we have not yet patched: our emotional firewall . This...
Daniela Farina - October 1, 2025
Programming in crisis: Junior job openings plummet as AI transforms the workplace. Cyber News

Programming in crisis: Junior job openings plummet as AI transforms the workplace.

Artificial intelligence is no longer a futuristic concept from science fiction films . It is already part of our daily...
Redazione RHC - October 1, 2025
Work, Artificial Intelligence, and Marketing: What Skills Will We Need in 2025? Cyber News

Work, Artificial Intelligence, and Marketing: What Skills Will We Need in 2025?

In recent years, the marketing industry has undergone a radical transformation : today, one in two positions requires artificial intelligence...
Luca Vinciguerra - September 30, 2025

Cyberattacks on NFC contactless payments increase, new global threat

A new series of cyber attacks has been detected by ESET specialists, which sees the contactless payments sector with NFC technology as the protagonist. This type of attack was initially...

The Race to 0day! China Advances in Offensive Cyberpower, While the US Is Forced to Chase

China's growing rise has prompted U.S. officials to strongly emphasize the need to improve its offensive cyber capabilities. However, some doubts remain about the ability to meet the challenge, given...

Cyberbullying and Digital Terror: Why Betti’s Comic Makes You Feel Uncomfortable (and That’s a Good Thing)

When I decided to write this story of Betti, it was certainly not to make a “nice” or “easy” comic, to read on a sunny afternoon at the beach and...

Miniaturized Military Drone, Mosquito-Sized Model Arrives and China Offers It

In the military sector, the trend to miniaturize drones seems to know no limits, especially when the goal is to operate without being detected. An example of this race to...

Cyber Security: CISA and NSA Recommend Secure Programming Languages

The main US cybersecurity agencies, CISA and NSA, have published a joint document recommending that software developers opt for programming languages considered "memory safe". These languages are designed to provide...

Apple and Google under pressure: German regulator wants to remove DeepSeek

Following the Italian data protection regulator, Germany's data protection watchdog has now asked Apple and Alphabet subsidiary Google to remove the Chinese artificial intelligence (AI) startup's DeepSeek app from their...

A former Australian university student has been accused of hacking Western Sydney University

New South Wales police have arrested a 27-year-old former Western Sydney University student who had repeatedly hacked into the university's systems, including to obtain cheaper parking. Western Sydney University is...

Skynet is coming: the malware that attacks Artificial Intelligence!

An unusual example of malicious code has been discovered in a real computing environment, which for the first time recorded an attempt to attack not classical defense mechanisms, but directly...

Critical Vulnerabilities Discovered in Hundreds of Brother and Other Printers

Hundreds of printer models from Brother and other manufacturers (Fujifilm, Toshiba, Ricoh and Konica Minolta) have been found to be vulnerable to serious vulnerabilities discovered by researchers at Rapid7. For...

He died because of ransomware! Another victim joins the list

This is not the first time that a cyber attack has resulted in the loss of human lives.We had already discussed it in the article "I deferichò per il ransomware....

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE