Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Crowdstrike 320×100
LECS 970x120 1

Author: Redazione RHC

Redazione RHC

The Red Hot Cyber Editorial Team provides daily updates on bugs, data breaches, and global threats. Every piece of content is validated by our community of experts, including Pietro Melillo, Massimiliano Brolli, Sandro Sana, Olivia Terragni, and Stefano Gazzella.

Through synergy with our industry-leading partners—such as Accenture, CrowdStrike, Trend Micro, and Fortinet—we transform technical complexity into collective awareness. We ensure information accuracy by analyzing primary sources and maintaining a rigorous technical peer-review process.

Numero di articoli trovati: 900

At the Spinoza Campus in Amsterdam, 1,200 students were held hostage by washing machines.

An unusual incident occurred at the Spinoza Campus in Amsterdam: an unknown attacker hacked the digital payment system of five washing machines. For several weeks, students were able to use...

China reports 600 APT cyber attacks in 2024. Washington is in its sights.

During a regular press conference, Foreign Ministry spokesperson Guo Jiakun answered questions from reporters on various current international issues. At the center of the discussion were cyber attacks attributed to...

Looking for Volodymyr Tymoshchuk! 11 million dollars for the Nefilim hacker

The U.S. Department of Justice has indicted Ukrainian Volodymyr Tymoshchuk on seven counts of computer hacking and extortion. He is considered one of the most dangerous hackers of recent years....

Google fights misinformation: C2PA arrives on Pixel and Photos for AI image recognition.

Google announced that it will integrate C2PA Content Credentials technology into the Pixel 10 camera app and Google Photos to help users distinguish authentic images from those created or modified...

FlexiSPY Alert: The Easy-to-Use Spy App Can Intercept Everything, Even El Chapo

Two Kenyan documentary filmmakers were placed under surveillance by security services for their work on a film about youth protests. Computer forensics researchers say their phones were infected with FlexiSPY...

SpamGPT is here! The new phishing kit that combines AI, spam, and diabolical genius.

A new tool called SpamGPT has appeared on underground forums and has quickly become a hot topic in the cybersecurity community. The malicious software combines the capabilities of generative artificial...

Former WhatsApp employee: “1,500 engineers have access to confidential user data.”

Attaullah Baig, who reportedly led WhatsApp's security team from 2021 to 2025, has filed a lawsuit against parent company Meta. Baig claims he was fired for repeatedly attempting to fix...

iCloud Calendar Phishing Scam: How It Works and How to Protect Yourself

It has been discovered that iCloud Calendar invitations have been used to send phishing emails disguised as purchase notifications directly from Apple's mail servers. This tactic increases the likelihood of...

Phishing in the Classroom! 115,000 emails targeted 13,500 organizations with Google Classroom.

Check Point researchers have discovered a large-scale active phishing campaign exploiting Google Classroom, a platform trusted by millions of students and educators worldwide. Over the course of a single week,...

6 million euros a day! That’s the cost of the cyber attack on Jaguar Land Rover.

Jaguar Land Rover (JLR), one of Britain's largest car manufacturers, has been hit by a cyber attack that has paralyzed its IT systems.Production at plants in the UK and abroad...