Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
Fortinet 970x120px

Category: Cybercrime

Find the latest cybercrime news on Red Hot Cyber, with real-time updates on ransomware attacks, darknets, data breaches and cybercriminal activities worldwide. In-depth analysis of threat actors, attack techniques, underground markets and digital crime trends, helping professionals and organizations stay informed, aware and protected in an evolving threat landscape.

Numero di articoli trovati: 274

FlorentIA: A Look at Artificial Intelligence in the Heart of Florence

At the beginning of this month, Florence hosted a unique event on October 1st: FlorentIA . FlorentIA presents itself as an unmissable event for understanding Artificial Intelligence and its multiple...

The most famous female hackers ever: Kimberley Vanvaeck aka Gigabyte.

Gigabyte is the pseudonym of Kimberley Vanvaeck, a Belgian hacker known for writing numerous high-end malware, as well as for a long-running dispute with the security firm Sophos. Gigabyte, when...

Famous Hackers: The Story of Adrian Lamo

Adrian Lamo was a hacker who found new ways to breach companies and make them realize how insecure they were. From his early hacks to hacking into prestigious companies while...

Pasquale’s Experience: A Text Message in the Heat – Session 1

Cybercrime is increasingly looming over the unfortunate online world. Fake profiles and scams are rampant on social networks, which, even with the best artificial intelligence, struggle to keep up with...

Inside IEEE 802.11 Wireless Networks: Wi-Fi Architecture and Signaling

IEEE 802.11 wireless networks, better known as Wi-Fi, are the beating heart of modern connectivity. From a niche solution for home use to a technological cornerstone for the Internet of...

WiFi: From Marconi’s Origins to the Wireless Network We Know Today

Today, we live in a world where WiFi is a fundamental necessity, but how did this technology, now taken for granted, come about? How did it then develop into the...

Cyberdrones, radar evasion, and autonomous swarms: Rome, the invisible challenge of Jubilee 2025

Jubilee 2025 in Rome presents a challenge not only for managing millions of pilgrims and tourists, but also for protecting urban airspace. Drones, increasingly widespread and accessible, bring with them...

The Poison of Curiosity and the Antidote of Cyber Hygiene: A Social Engineering Recipe

Curiosity, that old rascal. It's the kind of thing that's been making people click links or open attachments in a decidedly reckless manner for a long time. After all, it's...

Alert: Thousands of Italian websites at risk! 526,000 sites and 6,500 databases for sale on the Darkweb

A new post on the dark web offers full access to thousands of MySQL servers and databases owned by Italian shared hosting providers. In the last few hours, a new...

“Double Bind” Leads to GPT-5 Jailbreak: The AI That Was Convinced It Was Schizophrenic

A new and unusual jailbreaking method, the art of circumventing the limitations imposed on artificial intelligence, has reached our editorial office. It was developed by computer security researcher Alin Grigoras...