Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

UtiliaCS 970x120
Precedente Successivo

Latest news

A Brief History of Artificial Intelligence: From Alan Turing to Generative AI Cyber News

A Brief History of Artificial Intelligence: From Alan Turing to Generative AI

Artificial Intelligence (AI) is in the Spotlight Today, Generating Unprecedented Interest and Debate. However, it's important to recognize that this...
Silvia Felici - June 30, 2024
The Virginia Department of Elections database may have been hacked and is online on the dark web Cybercrime

The Virginia Department of Elections database may have been hacked and is online on the dark web

A serious security incident appears to have hit the Virginia Department of Elections, causing the unauthorised dissemination of a large...
Pietro Melillo - June 30, 2024
Identified a POC for the CVE-2024-34102 Vulnerability in Magento / Adobe Commerce Cybercrime

Identified a POC for the CVE-2024-34102 Vulnerability in Magento / Adobe Commerce

Recently, a Proof of Concept (POC) for a vulnerability identified as CVE-2024-34102, which affects the Magento and Adobe Commerce e-commerce...
RHC Dark Lab - June 29, 2024
Cyberpunk 2077: Source Code Stolen? Cybercrime

Cyberpunk 2077: Source Code Stolen?

A malicious actor has claimed to have obtained access to the complete source code of Cyberpunk 2077, the famous role-playing...
Pietro Melillo - June 29, 2024
Alleged Leak of the 2020 Israeli Voter Database Cybercrime

Alleged Leak of the 2020 Israeli Voter Database

In a significant and concerning development, an individual using the alias "mrwan" has allegedly leaked the 2020 Israeli voter database....
RHC Dark Lab - June 28, 2024
TeamViewer: Irregularity Detected in Internal IT Environment Cybercrime

TeamViewer: Irregularity Detected in Internal IT Environment

TeamViewer, a leading company in the remote access and support software sector, has announced that it has detected an irregularity...
RHC Dark Lab - June 28, 2024

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE