
Nearly a third of web traffic is generated by bots! The era of invasive AI is now
Yesterday, the Red Hot Cyber website was inaccessible for about an hour. But what’s going on, we wondered? After a series of analyses, here’s the
Yesterday, the Red Hot Cyber website was inaccessible for about an hour. But what’s going on, we wondered? After a series of analyses, here’s the
Recently, an advanced subgroup linked to the notorious threat actor Lazarus was detected distributing three different remote access Trojans (RATs) within compromised financial and cryptocurrency
Zscaler’s recent confirmation of a data breach resulting from a supply chain attack provides a case study in the evolution of threats against complex SaaS
A large-scale cyberattack has targeted security firm Zscaler, which has officially confirmed it was the victim of a supply chain breach. This attack exposed customer
Welcome to the first installment of our series, a three-week journey exploring the extraordinary dance between coevolution, cybersecurity, and the humanities, with a focus on
On August 27, 2025, the Wikimedia Foundation, which operates Wikipedia, received an official letter from the Committee on Oversight and Government Reform of the United
Last week, it emerged that criminal hackers had compromised the sales automation platform Salesloft and stolen OAuth and update tokens from customers in its AI
Every day we hear about privacy in every aspect of our lives, so much so that the term has entered common parlance. But what does
The “Tea Dating Advice” app reported a data breach on July 25, 2025, involving 72,000 images of users registered before February 2024, including 13,000 selfies
Abroad, it’s already a recognized field of study, but here it’s almost taboo: a journey through science, philosophy, and ethical perspectives. 1. The Great Italian