Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
LECS 970x120 1

Author: Redazione RHC

Redazione RHC

The Red Hot Cyber Editorial Team provides daily updates on bugs, data breaches, and global threats. Every piece of content is validated by our community of experts, including Pietro Melillo, Massimiliano Brolli, Sandro Sana, Olivia Terragni, and Stefano Gazzella.

Through synergy with our industry-leading partners—such as Accenture, CrowdStrike, Trend Micro, and Fortinet—we transform technical complexity into collective awareness. We ensure information accuracy by analyzing primary sources and maintaining a rigorous technical peer-review process.

Numero di articoli trovati: 375

GhostRedirector: The Black SEO Redirect Campaign That Manipulates Search Engines

A cybercriminal group, dubbed GhostRedirector by ESET researchers and linked to the Chinese ecosystem, has quietly deployed a global search engine manipulation scheme based on hacked Windows hosts. According to...

Underwater warfare is upon us! Will Chinese cable cutters pose a global threat?

The new cable cutter, developed by the China Shipbuilding Research Center, is designed for use on advanced submarines such as the Fengdou and Haidou series. The device is capable of...

$16 billion in stolen Apple, Meta, and Google credentials up for sale for $121,000

The Darklab team, Red Hot Cyber's community of threat intelligence experts, has identified an ad on the dark web marketplace "Tor Amazon", the criminal counterpart of the popular e-commerce site...

Trump meets with all the AI tech leaders at the White House. Elon Musk is notably absent!

Today, Thursday, September 4, 2025, US President Donald Trump will host over two dozen technology and business leaders for a dinner in the newly renovated White House Rose Garden. An...

Microsoft Introduces POML for Orchestrating LLM Prompts

Microsoft today introduced POML (Prompt Orchestration Markup Language), a new markup language for prompt orchestration and specifically designed to enable rapid and structured prototyping of large language models (LLMs). POML...

Revolutionize security models with the Unified SASE framework

A unified and secure approach to support digital transformation, enable hybrid working, and reduce operational complexity. By Federico Saraò, Specialized System Engineer SASE, Fortinet Italy The nature of a company's...

Jaguar Land Rover victim of hacker attack: production halted!

Automaker Jaguar Land Rover (JLR) announced that it was forced to disable several systems due to a hacker attack. The incident appears to have impacted the automaker's manufacturing and retail...

AI will grow by 50% and so will your anxiety about your electricity bill.

The global data center industry is preparing for a sharp increase in computing platforms for AI demands. According to Goldman Sachs, installed data center capacity will grow by approximately 50%...

Cloudflare also hacked in the Salesforce incident! Cloud risks affect everyone.

A data intrusion was detected by Cloudflare, where an experienced attacker was able to access and steal sensitive customer data from the company's Salesforce instance. The breach was part of...

Trend Micro: Beware of the “Task Scam,” the scam targeting online job seekers.

The latest research from the security leader reveals the fraudulent mechanisms behind fake job opportunities offered by digital platforms The number of victims of the "Task scam" is increasing worldwide,...