Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
Fortinet 970x120px

Author: Redazione RHC

Redazione RHC

The Red Hot Cyber Editorial Team provides daily updates on bugs, data breaches, and global threats. Every piece of content is validated by our community of experts, including Pietro Melillo, Massimiliano Brolli, Sandro Sana, Olivia Terragni, and Stefano Gazzella.

Through synergy with our industry-leading partners—such as Accenture, CrowdStrike, Trend Micro, and Fortinet—we transform technical complexity into collective awareness. We ensure information accuracy by analyzing primary sources and maintaining a rigorous technical peer-review process.

Numero di articoli trovati: 375

The Battle Between OnlyFans and Google: Piracy, AI, and the Chaos of Automated Copyright

The massive clash between adult content creators and pirates, now transferred to automated copyright protection systems, is beginning to radically change the face of the Internet. Every day, it becomes...

Nearly a third of web traffic is generated by bots! The era of invasive AI is now

Yesterday, the Red Hot Cyber website was inaccessible for about an hour. But what's going on, we wondered? After a series of analyses, here's the result: the internet is changing...

Zscaler Suffers Data Breach: Supply Chain Attack Via Salesloft Drift

A large-scale cyberattack has targeted security firm Zscaler, which has officially confirmed it was the victim of a supply chain breach. This attack exposed customer contact data due to compromised...

From AI chatbots to global data theft: The Drift flaw rocks Google Workspace.

Last week, it emerged that criminal hackers had compromised the sales automation platform Salesloft and stolen OAuth and update tokens from customers in its AI agent Drift, designed to integrate...

What a hacker attack! Ursula von der Leyen’s plane was the victim of an electronic warfare attack (EW)

A disturbing episode of electronic warfare (EW) directly involved the President of the European Commission, Ursula von der Leyen. On approach to Plovdiv Airport in Bulgaria, the jet carrying the...

Fiber Computers Are Coming! E-textiles Are Coming, the Smart Fabric Revolution

Scientists have assembled the key elements of a computing system into a single, flexible, and even machine-washable thread. The idea is to weave many of these threads into fabric to...

Amazon Stops APT29: Sophisticated Russian Watering Hole Campaign Foiled

A complex watering hole campaign, orchestrated by the notorious hacker group APT29, linked to Russian foreign intelligence services, was neutralized by Amazon's cybersecurity team. This latest campaign marks a significant...

Moscow hires hackers who attacked the Electronic School in 2022 to improve it

Participants in the cyberattack on the Moscow Electronic School were offered towork to improve cybersecurity and other digital services of the capital's administration. This all comes after September 17, 2022,...

AI browser extensions? There’s too much uncertainty: the risk still lies in user awareness!

Anthropic has raised the alarm about a new threat related to "smart" browser extensions: Websites can infiltrate hidden commands that an AI agent will execute without thinking. Anthropic has released...

By 2026, no more “ghost” apps: Android will only accept verified developers.

Google representatives announced that starting in 2026, only apps from verified developers will be able to be installed on certified Android devices. This measure aims to combat malware and financial...