Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
Cyber Offensive Fundamentals 970x120 V0.1

Author: Redazione RHC

Redazione RHC

The Red Hot Cyber Editorial Team provides daily updates on bugs, data breaches, and global threats. Every piece of content is validated by our community of experts, including Pietro Melillo, Massimiliano Brolli, Sandro Sana, Olivia Terragni, and Stefano Gazzella.

Through synergy with our industry-leading partners—such as Accenture, CrowdStrike, Trend Micro, and Fortinet—we transform technical complexity into collective awareness. We ensure information accuracy by analyzing primary sources and maintaining a rigorous technical peer-review process.

Numero di articoli trovati: 375

The secret behind Space Invaders’ speed? A technical limitation of the hardware

In 1978, Taito's Space Invaders captivated audiences with its seemingly ingenious gameplay: the more aliens you shot down, the faster the remaining ones moved. A crescendo of tension that marked...

$2.8 billion in cryptocurrency stolen! Here’s how North Korea circumvents UN sanctions.

Member countries of the international monitoring group MSMT have concluded that North Korea is increasing its use of cybercrime and the remote work of its citizens abroad to circumvent international...

OpenAI is working on a neural network for music creation

According to The Information, OpenAI is actively working on its own neural network for music creation , which will compete with projects like Suno and Udio. The publication's sources report...

BreachForums Resurrects After Yet Another FBI Shutdown

We've often quoted this phrase: "Fighting cybercrime is like pulling weeds: if you don't completely eradicate them, they'll grow back, much more vigorous than before," and it's more relevant than...

Gemini 3.0 Pro: Google prepares for the generational leap and aims to surpass GPT-5 and Claude 4.5

Over the past few days, some users have received a notification saying that their Gemini Advanced devices have been "upgraded from the previous generation model to the 3.0 Pro, the...

Neolix raises $600 million for autonomous driving in urban logistics

Chinese startup Neolix , specializing in Level 4 autonomous vehicles for urban deliveries, announced on October 23 that it has closed a Series D round of over $600 million ,...

Supercomputing power in a refrigerator: the BIE-1 revolution

On October 24, the world's first human-inspired intelligent computing system, the "BI Explorer BIE-1," was officially unveiled at the Guangdong-Macao Deep Cooperation Zone in Hengqin. Zhang Xu, director of the...

AVKiller + HeartCrypt: The Combo That Opens the Door to Ransomware

A tool has appeared on the cybercriminal market that has quickly become a mass-produced weapon for dozens of groups. It's HeartCrypt , a malware packaging service masquerading as a legitimate...

Microsoft Edge protects Internet Explorer mode from attacks

The Microsoft Edge security team made significant changes to Internet Explorer mode after receiving confirmation of targeted attacks using it. Experts discovered that attackers exploited vulnerabilities in the outdated Chakra...

Russia legalizes white hat hackers with new law

Russia is preparing a new version of a bill legalizing white hat hackers . Two sources in government agencies and the cybersecurity industry told RBC that the document has already...