Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Mobile
970x20 Itcentric

Author: Redazione RHC

Redazione RHC

The Red Hot Cyber Editorial Team provides daily updates on bugs, data breaches, and global threats. Every piece of content is validated by our community of experts, including Pietro Melillo, Massimiliano Brolli, Sandro Sana, Olivia Terragni, and Stefano Gazzella.

Through synergy with our industry-leading partners—such as Accenture, CrowdStrike, Trend Micro, and Fortinet—we transform technical complexity into collective awareness. We ensure information accuracy by analyzing primary sources and maintaining a rigorous technical peer-review process.

Numero di articoli trovati: 891

Devastating Cyber Attack Paralyzes Nevada Government Network

Nevada's government network was paralyzed after an incident in the early morning hours of August 24. The attack rendered the state's IT infrastructure inoperable and forced most offices to close...

Auchan data leak: hundreds of thousands of customers affected by a hacker attack

French retailer Auchan has informed hundreds of thousands of customers that their personal data has been stolen following a hacker attack. In notifications sent to users last week, the company...

PromptLock Arrives. The First Artificial Intelligence-Powered Ransomware for Windows and Linux

Finally (metaphorically speaking), we're here. ESET experts have reported the first ransomware program in which artificial intelligence plays a key role. The new sample has been named PromptLock. It is...

UNC6395 campaign aims to exfiltrate Salesforce data via compromised OAuth tokens

A sophisticated data exfiltration campaign targeting companies' Salesforce instances was conducted, resulting in the exposure of sensitive information from several organizations. This occurred through compromised OAuth tokens associated with the...

Supercomputer: Fugaku NEXT will be Japan’s first zetta-class supercomputer

RIKEN, Fujitsu, and Nvidia are collaborating on the development of FugakuNEXT, Japan's new flagship supercomputer, scheduled to become operational at the RIKEN campus in Kobe around 2030. With an estimated...

Father and son wanted by the FBI. $10 million reward for hackers who collaborated with the GRU.

The FBI is offering a generous reward for anyone who can help find Amin Stigal, 23, and Timur Stigal, 47, a father and son team. They are accused of hacking...

No Miracle! The Pontifical Salesian University falls victim to ransomware.

On the night of August 19, the IT infrastructure of the Salesian Pontifical University (UPS) was the victim of a serious cyber attack that rendered the University's website and all...

AI Phishing is here! ChatGPT, click here now to avoid losing access!

Phishing attacks are becoming increasingly sophisticated and are now targeting not only users, but also automated AI-based defenses. Researchers have discovered a campaign in which attackers embed hidden instructions in...

Why Task Scheduler Has Become Security Teams’ Worst Nightmare

Over the past twelve months, security experts have noticed an increase in attackers using Windows scheduling capabilities, intended for system management, to establish their presence within compromised systems. Malicious commands...

200 car models vulnerable? ‘Killer’ firmware for Flipper Zero surfaces on the darknet.

The topic of hacking and car theft using Flipper Zero has returned to the forefront around the world, and we also talked about it in a recent article. This time,...