Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Ancharia Mobile 1
Banner Ransomfeed 970x120 1

Author: Redazione RHC

Redazione RHC

The Red Hot Cyber Editorial Team provides daily updates on bugs, data breaches, and global threats. Every piece of content is validated by our community of experts, including Pietro Melillo, Massimiliano Brolli, Sandro Sana, Olivia Terragni, and Stefano Gazzella.

Through synergy with our industry-leading partners—such as Accenture, CrowdStrike, Trend Micro, and Fortinet—we transform technical complexity into collective awareness. We ensure information accuracy by analyzing primary sources and maintaining a rigorous technical peer-review process.

Numero di articoli trovati: 902

China launches compact space debris removal system

Chinese scientists have unveiled a compact space launcher, initially designed to remove dangerous space debris, but which could potentially be used as a weapon. The project was conceived by engineers...

AI browser extensions? There’s too much uncertainty: the risk still lies in user awareness!

Anthropic has raised the alarm about a new threat related to "smart" browser extensions: Websites can infiltrate hidden commands that an AI agent will execute without thinking. Anthropic has released...

Phishing on Teams: at least the hacker responds faster than the real help desk!

In recent months, as previously reported on Red Hot Cyber, a new front has emerged in the corporate phishing landscape: Microsoft Teams attacks in which attackers impersonate IT or help...

Popular password managers, including LastPass, 1Password, and Bitwarden, are vulnerable to clickjacking.

A security expert has discovered that six of the most popular password managers, used by tens of millions of people, are vulnerable to clickjacking, a phenomenon that allows attackers to...

The Democratization of Cybercrime Has Arrived! “I Can’t Code, But I Write Ransomware”

Cybercriminals are rapidly mastering generative AI, and we're no longer talking about "scary" ransom notes, but about full-fledged malware development. The Anthropic research team reported that attackers are increasingly relying...

ChatGPT “Taught My Son How to Die”! Adam Reid’s Parents Sue OpenAI

A lawsuit has been filed against OpenAI in California, alleging that ChatGPT driven a 16-year-old to commit suicide. The parents of Adam Reid, who died on April 11, 2025, said...

By 2026, no more “ghost” apps: Android will only accept verified developers.

Google representatives announced that starting in 2026, only apps from verified developers will be able to be installed on certified Android devices. This measure aims to combat malware and financial...

Devastating Cyber Attack Paralyzes Nevada Government Network

Nevada's government network was paralyzed after an incident in the early morning hours of August 24. The attack rendered the state's IT infrastructure inoperable and forced most offices to close...

Auchan data leak: hundreds of thousands of customers affected by a hacker attack

French retailer Auchan has informed hundreds of thousands of customers that their personal data has been stolen following a hacker attack. In notifications sent to users last week, the company...

PromptLock Arrives. The First Artificial Intelligence-Powered Ransomware for Windows and Linux

Finally (metaphorically speaking), we're here. ESET experts have reported the first ransomware program in which artificial intelligence plays a key role. The new sample has been named PromptLock. It is...