Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Enterprise BusinessLog 320x200 1
Crowdstriker 970×120

Author: Redazione RHC

Redazione RHC

The Red Hot Cyber Editorial Team provides daily updates on bugs, data breaches, and global threats. Every piece of content is validated by our community of experts, including Pietro Melillo, Massimiliano Brolli, Sandro Sana, Olivia Terragni, and Stefano Gazzella.

Through synergy with our industry-leading partners—such as Accenture, CrowdStrike, Trend Micro, and Fortinet—we transform technical complexity into collective awareness. We ensure information accuracy by analyzing primary sources and maintaining a rigorous technical peer-review process.

Bloody Wolf Attacks Central Asia with NetSupport RAT via Java Exploits

Group-IB specialists have recorded new attacks by the Bloody Wolf hacker group, which has been targeting Kyrgyzstan since June 2025 and has expanded its operations to Uzbekistan since October. The...
Share on Facebook Share on LinkedIn Share on X

WhatsApp Blocked in Russia: Messaging App Faces Crackdown

The Russian Federation's Roskomnadzor has announced that it continues to impose systematic restrictions on the messaging app WhatsApp due to violations of Russian law. According to the agency, the service...
Share on Facebook Share on LinkedIn Share on X

CEO Scam: How to Protect Your Company from Business Email Compromise

This morning, Paragon Sec was contacted by an Italian company that had been the victim of a new fraud attempt known as the CEO Scam . The accounting department received...
Share on Facebook Share on LinkedIn Share on X

Shai-Hulud Worm Spreads Beyond npm, Attacks Maven

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used...
Share on Facebook Share on LinkedIn Share on X

11.7% of jobs could be replaced by artificial intelligence

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable...
Share on Facebook Share on LinkedIn Share on X

The market for “controlling” people is taking off on the Dark Web.

BI.ZONE experts analyzed over 3,500 advertisements on darknet platforms offering dossiers on specific individuals, known as "probiv" (finding). One in five offers (21%) promises a complete profile of an individual....
Share on Facebook Share on LinkedIn Share on X

Does Windows Suck? A Video by Dave Plummer, the Microsoft Engineer Who Created Task Manager

Dave Plummer, a highly regarded former senior engineer at Microsoft who led the development of several key Windows components, including Task Manager, the Windows NT port of Space Cadet Pinball...
Share on Facebook Share on LinkedIn Share on X

China surpasses US in open-source AI models

China surpasses the United States in the global market for open-source artificial intelligence (AI) models. According to a November 26 Financial Times report, a study by MIT and open-source AI...
Share on Facebook Share on LinkedIn Share on X

ENISA takes on the role of Root in the European Cybersecurity Initiative (CVE).

The European Union Agency for Cybersecurity (ENISA) has taken on the role of Root within the Common Vulnerabilities and Exposures (CVE) programme, becoming the main point of reference for national...
Share on Facebook Share on LinkedIn Share on X

Supply Chain Attack on OpenAI: Analytics Provider Mixpanel Compromised

OpenAI has confirmed a security incident at Mixpanel, a third-party analytics provider used for its APIs. According to the investigation, the cause of the security incident involving OpenAI and Mixpanel...
Share on Facebook Share on LinkedIn Share on X