Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Ancharia Mobile 1
970x20 Itcentric

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

How a simple Visual Studio Code file can become a backdoor for state-run hackers Cyber News

How a simple Visual Studio Code file can become a backdoor for state-run hackers

Security researchers have recently observed a worrying evolution in the offensive tactics attributed to North Korean-linked actors as part of...
Redazione RHC - 26 January 2026
Khaby Lame is selling the rights to his digital identity for $900 million. But there’s reason to think. Cyber News

Khaby Lame is selling the rights to his digital identity for $900 million. But there’s reason to think.

Khaby Lame, the world's most followed Italian creator and now a global social media icon, has taken a step that...
Redazione RHC - 26 January 2026
Microsoft Teams will know where you are: your geographic location will be inferred from your Wi-Fi Cyber News

Microsoft Teams will know where you are: your geographic location will be inferred from your Wi-Fi

Microsoft is preparing to introduce an update that will transform a small manual habit into a system-wide automation. Soon, Microsoft...
Redazione RHC - 26 January 2026
CISA alert: Exploit underway against VMware vCenter. Risk of RCE without authentication. Cyber News

CISA alert: Exploit underway against VMware vCenter. Risk of RCE without authentication.

The critical vulnerability recently added to the Cybersecurity and Infrastructure Security Agency (CISA) catalog of known exploited vulnerabilities (KEVs) affects...
Redazione RHC - 25 January 2026
Linux 7.0 says goodbye to the HIPPI relic: a piece of supercomputing history has been eliminated. Cyber News

Linux 7.0 says goodbye to the HIPPI relic: a piece of supercomputing history has been eliminated.

The Linux kernel has long been a well-established reality, and while it still contains code for technologies no longer in...
Silvia Felici - 25 January 2026
The Grok scandal: 3 million sexually explicit images generated in 11 days Cyber News

The Grok scandal: 3 million sexually explicit images generated in 11 days

A recent study reveals that in just 11 days of processing, Grok produced approximately 3 million sexually explicit images. The...
Agostino Pellegrino - 25 January 2026

How a simple Visual Studio Code file can become a backdoor for state-run hackers

Security researchers have recently observed a worrying evolution in the offensive tactics attributed to North Korean-linked actors as part of the campaign known as Contagious Interview : no longer simple...

Khaby Lame is selling the rights to his digital identity for $900 million. But there’s reason to think.

Khaby Lame, the world's most followed Italian creator and now a global social media icon, has taken a step that could mark a turning point in the history of the...

Microsoft Teams will know where you are: your geographic location will be inferred from your Wi-Fi

Microsoft is preparing to introduce an update that will transform a small manual habit into a system-wide automation. Soon, Microsoft Teams will be able to infer and display a user's...

CISA alert: Exploit underway against VMware vCenter. Risk of RCE without authentication.

The critical vulnerability recently added to the Cybersecurity and Infrastructure Security Agency (CISA) catalog of known exploited vulnerabilities (KEVs) affects the Broadcom VMware vCenter Server and is being actively exploited...

Linux 7.0 says goodbye to the HIPPI relic: a piece of supercomputing history has been eliminated.

The Linux kernel has long been a well-established reality, and while it still contains code for technologies no longer in use, it's likely that some people still rely on these...

The Grok scandal: 3 million sexually explicit images generated in 11 days

A recent study reveals that in just 11 days of processing, Grok produced approximately 3 million sexually explicit images. The data regarding approximately 23,000 images depicting minors is particularly concerning....

“I Stole 120,000 Bitcoins”: The Confession of the Bitfinex Hacker Who Now Wants to Defend Cyberspace

The story ofIlya Lichtenstein, the hacker responsible for one of the largest cyber attacks ever carried out against cryptocurrencies, reads like an episode of a TV series, yet it is...

AGI: Google and Anthropic CEOs sound the alarm at Davos – the world won’t be ready!

If there were any doubts about whether the world's leading AI companies agreed on the direction of AI, or how quickly it should get there, those doubts were dispelled at...

A working browser built with AI using 3 million lines of code: breakthrough or illusion?

A week ago, Cursor CEO Michael Truell announced a supposedly remarkable achievement. He claimed that, using GPT-5.2, Cursor had created a browser capable of running continuously for an entire week....

Kimwolf: The IoT botnet that moves silently across corporate and government networks

The Kimwolf botnet represents one of the most insidious IoT threats to emerge recently. According to the latest analyses, this malicious infrastructure has already compromised over two million devices ,...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCyber News
How a simple Visual Studio Code file can become a backdoor for state-run hackers
Redazione RHC - 26/01/2026

Security researchers have recently observed a worrying evolution in the offensive tactics attributed to North Korean-linked actors as part of the campaign known as Contagious Interview : no longer simple fake job interview scams, but…

Immagine del sitoCyber News
Khaby Lame is selling the rights to his digital identity for $900 million. But there’s reason to think.
Redazione RHC - 26/01/2026

Khaby Lame, the world’s most followed Italian creator and now a global social media icon, has taken a step that could mark a turning point in the history of the digital economy. According to several…

Immagine del sitoCyber News
CISA alert: Exploit underway against VMware vCenter. Risk of RCE without authentication.
Redazione RHC - 25/01/2026

The critical vulnerability recently added to the Cybersecurity and Infrastructure Security Agency (CISA) catalog of known exploited vulnerabilities (KEVs) affects the Broadcom VMware vCenter Server and is being actively exploited by malicious hackers to breach…

Immagine del sitoCyber News
“I Stole 120,000 Bitcoins”: The Confession of the Bitfinex Hacker Who Now Wants to Defend Cyberspace
Agostino Pellegrino - 25/01/2026

The story ofIlya Lichtenstein, the hacker responsible for one of the largest cyber attacks ever carried out against cryptocurrencies, reads like an episode of a TV series, yet it is absolutely real. After being released,…

Immagine del sitoCyber News
NoName057(16) hits Italy 487 times in the last 3 months: the DDoS wave does not stop
Redazione RHC - 24/01/2026

Italy has confirmed itself as one of the main targets of the DDoS attack campaign carried out by the hacktivist group NoName057(16) . According to what was declared directly by the collective, our country has…