Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
UtiliaCS 970x120

Author: Redazione RHC

Redazione RHC

The Red Hot Cyber Editorial Team provides daily updates on bugs, data breaches, and global threats. Every piece of content is validated by our community of experts, including Pietro Melillo, Massimiliano Brolli, Sandro Sana, Olivia Terragni, and Stefano Gazzella.

Through synergy with our industry-leading partners—such as Accenture, CrowdStrike, Trend Micro, and Fortinet—we transform technical complexity into collective awareness. We ensure information accuracy by analyzing primary sources and maintaining a rigorous technical peer-review process.

Numero di articoli trovati: 375

Devastating Cyber Attack Paralyzes Nevada Government Network

Nevada's government network was paralyzed after an incident in the early morning hours of August 24. The attack rendered the state's IT infrastructure inoperable and forced most offices to close...

Why Task Scheduler Has Become Security Teams’ Worst Nightmare

Over the past twelve months, security experts have noticed an increase in attackers using Windows scheduling capabilities, intended for system management, to establish their presence within compromised systems. Malicious commands...

“Son, get access to your dad’s smartphone!” Sharp increase in fraud involving minors

F6 has reported a sharp increase in fraud in which criminals exploit minors to access their parents' bank accounts. According to analysts, approximately 3,500 such cases were recorded in the...

Microsoft is investigating an Exchange Online outage affecting the Outlook mobile app

A serious issue with the Exchange Online service, flagged as EX1137017, is currently under investigation by Microsoft. Due to this issue, a number of users are unable to send or...

Beware of dissatisfied employees! Four years in prison for bringing his former company to its knees.

A former employee has been convicted of intentionally committing digital sabotage against his employer. Davis Lu, 55, a Chinese citizen living in Houston, was sentenced to four years in prison...

Will 2029 be the year of Q-Day? But what if the SHA1 replacement took 12 years?

Security experts are increasingly talking about "Q-Day," the moment when quantum computers will be able to handle modern encryption algorithms. Predictions from major players, from IBM and Google to Gartner...

FIDO Downgrade Attacks, a New Authentication Threat

Proofpoint researchers have identified a sophisticated downgrade attack that could bypass FIDO-based authentication, exposing targets to adversary-in-the-middle (AiTM) threats.These are some of the key findings the researchers found: Using a...

Roblox under fire in Louisiana: A haven for sexual predators

Louisiana Attorney General Liz Murrill has filed a lawsuit against Roblox, accusing the company of allowing its platform to become a haven for sexual predators and distributors of child-themed content....

Tesla’s Dojo project is dead. A technological gamble ended in resounding failure.

On July 23, 2025, Tesla held its second-quarter earnings conference call. Elon Musk, as usual, conveyed his infectious optimism to Wall Street. Speaking about Dojo, the company's carefully constructed artificial...

RIP Microsoft PowerShell 2.0! The end of an era is coming between August and September

Microsoft will remove PowerShell 2.0 from Windows starting in August, years after announcing its deprecation and keeping it as an optional feature. The 14-year-old command processor introduced with Windows 7...