A cybercriminal group, dubbed GhostRedirector by ESET researchers and linked to the Chinese ecosystem, has quietly deployed a global search engine manipulation scheme based on hacked Windows hosts. According to...
The new cable cutter, developed by the China Shipbuilding Research Center, is designed for use on advanced submarines such as the Fengdou and Haidou series. The device is capable of...
The Darklab team, Red Hot Cyber's community of threat intelligence experts, has identified an ad on the dark web marketplace "Tor Amazon", the criminal counterpart of the popular e-commerce site...
Today, Thursday, September 4, 2025, US President Donald Trump will host over two dozen technology and business leaders for a dinner in the newly renovated White House Rose Garden. An...
Microsoft today introduced POML (Prompt Orchestration Markup Language), a new markup language for prompt orchestration and specifically designed to enable rapid and structured prototyping of large language models (LLMs). POML...
A unified and secure approach to support digital transformation, enable hybrid working, and reduce operational complexity. By Federico Saraò, Specialized System Engineer SASE, Fortinet Italy The nature of a company's...
Automaker Jaguar Land Rover (JLR) announced that it was forced to disable several systems due to a hacker attack. The incident appears to have impacted the automaker's manufacturing and retail...
The global data center industry is preparing for a sharp increase in computing platforms for AI demands. According to Goldman Sachs, installed data center capacity will grow by approximately 50%...
A data intrusion was detected by Cloudflare, where an experienced attacker was able to access and steal sensitive customer data from the company's Salesforce instance. The breach was part of...
The latest research from the security leader reveals the fraudulent mechanisms behind fake job opportunities offered by digital platforms The number of victims of the "Task scam" is increasing worldwide,...