Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
Fortinet 970x120px

Category: Cyber News

Stay updated with the latest cybersecurity news in real time, including critical vulnerability alerts, zero-day exploits, software patches and data breach reports. Expert analysis on global cyber threats, hacking campaigns, malware and ransomware activities, curated by the Red Hot Cyber editorial team to provide timely insights, context and awareness for security professionals and organizations worldwide.

Numero di articoli trovati: 761

Geoffrey Hinton’s shocking revelations: Better to trust China than Zuckerberg!

Geoffrey Hinton, known as the "godfather of artificial intelligence," recently shared his thoughts in a panel with the Financial Times. Despite his public image as an "AI whistleblower" after resigning...

Jupiter, the exascale supercomputer that aims to revolutionize AI in Europe

The Jupiter supercomputer, inaugurated at the Jülich Supercomputing Center in Germany, represents a milestone for Europe. It is the continent's first exascale supercomputer, capable of performing at least one quadrillion...

38 million Italian phone numbers for sale on the dark web. It’s smishing!

Seven out of ten Italians have their phone numbers included in this database. But what does it mean to have such a large number of phone numbers concentrated within a...

Apitor, the first robot that helps children do their homework and the whistleblower for China

The U.S. Department of Justice has filed a lawsuit against Apitor Technology, accusing it of secretly collecting children's location data through a Chinese partner without their parents' knowledge or consent....

Hackable restaurant robots could serve sushi… at the attacker’s home.

An independent security specialist, known by the nickname BobDaHacker, discovered security flaws in Pudu Robotics (the world's leading provider of commercial service robots). The vulnerabilities allowed attackers to redirect the...

LECS powered by Cyber Evolution: la prima black box NDR completamente Made in Italy

In the current cybersecurity landscape, threats are moving ever faster and more sophisticated. Traditional defense tools are no longer sufficient to ensure complete visibility, especially when the attack leaves no...

Figure 02, the robot that loads the dishwasher with precision

California-based company Figure has unveiled another milestone for its humanoid Figure 02: the robot loaded a dishwasher with high precision using the versatile Helix model, based on the Vision-Language-Action (VLA)...

If Flash is dead, here’s the SVG Assassin! Phishing 2.0 is in high definition.

Cybercriminals have launched a new wave of attacks using SVG files to distribute phishing pages. Experts at VirusTotal have reported that attackers are impersonating the Colombian prosecutor's office, distributing email...

The Dark Side of Windows Drivers: How to Steal Data While Ignoring EDR

A recent study conducted by Workday's Offensive Security team highlighted a vulnerability in Windows drivers that effectively bypasses Endpoint Detection and Response (EDR) tools. This technique exploits direct disk reading,...

GhostRedirector: The Black SEO Redirect Campaign That Manipulates Search Engines

A cybercriminal group, dubbed GhostRedirector by ESET researchers and linked to the Chinese ecosystem, has quietly deployed a global search engine manipulation scheme based on hacked Windows hosts. According to...