Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Fortinet 320x100px
970x20 Itcentric

Author: Redazione RHC

Redazione RHC

The Red Hot Cyber Editorial Team provides daily updates on bugs, data breaches, and global threats. Every piece of content is validated by our community of experts, including Pietro Melillo, Massimiliano Brolli, Sandro Sana, Olivia Terragni, and Stefano Gazzella.

Through synergy with our industry-leading partners—such as Accenture, CrowdStrike, Trend Micro, and Fortinet—we transform technical complexity into collective awareness. We ensure information accuracy by analyzing primary sources and maintaining a rigorous technical peer-review process.

Numero di articoli trovati: 892

200 car models vulnerable? ‘Killer’ firmware for Flipper Zero surfaces on the darknet.

The topic of hacking and car theft using Flipper Zero has returned to the forefront around the world, and we also talked about it in a recent article. This time,...

“Son, get access to your dad’s smartphone!” Sharp increase in fraud involving minors

F6 has reported a sharp increase in fraud in which criminals exploit minors to access their parents' bank accounts. According to analysts, approximately 3,500 such cases were recorded in the...

Your kidneys for sale on the dark web! The DaVita ransomware attack affects 2.4 million patients

DaVita, an American company that operates a network of over 2,600 hemodialysis centers in the United States, reported a serious loss of patient personal data following a ransomware attack. According...

ChatGPT, will it be your new life companion? Humans are saying goodnight to AI

The artificial intelligence revolution is transforming not only work and productivity, but also personal relationships. More and more users report forming real emotional bonds with chatbots, to the point of...

DeepSeek launches version 3.1 of its AI model with support for Chinese chips

There was a day when DeepSeek surprised half the world by demonstrating that much could be done with less. Today it returns with version 3.1 and a message that doesn't...

Microsoft is investigating an Exchange Online outage affecting the Outlook mobile app

A serious issue with the Exchange Online service, flagged as EX1137017, is currently under investigation by Microsoft. Due to this issue, a number of users are unable to send or...

Can a file name compromise a Linux system? Chinese hackers say so

Researchers at Trellix have discovered an unusual attack pattern on Linux, in which the key element is not an attachment with malicious content, but the name of the file within...

Beware of dissatisfied employees! Four years in prison for bringing his former company to its knees.

A former employee has been convicted of intentionally committing digital sabotage against his employer. Davis Lu, 55, a Chinese citizen living in Houston, was sentenced to four years in prison...

When a VPN Becomes a Spy! FreeVPN.One Takes Unauthorized Screenshots

Koi Security experts warn that the behavior of the popular Chrome extension FreeVPN.One has recently changed. It has begun secretly capturing screenshots of users' activity and transmitting them to a...

Will 2029 be the year of Q-Day? But what if the SHA1 replacement took 12 years?

Security experts are increasingly talking about "Q-Day," the moment when quantum computers will be able to handle modern encryption algorithms. Predictions from major players, from IBM and Google to Gartner...