Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
HackTheBox 320x100 1
970x20 Itcentric

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

1X NEO Robot Unveils World Model for Advanced Learning Cybercrime

1X NEO Robot Unveils World Model for Advanced Learning

1X has released a major update for its NEO humanoid robot , not promising much but introducing a significant change...
Redazione RHC - 13 January 2026
Cybercrime Meets Real-Life Violence: Foxtrot Network’s Dark Side Cybercrime

Cybercrime Meets Real-Life Violence: Foxtrot Network’s Dark Side

In recent months, there has been increasing talk of a paradigm shift in cybercrime . What for years was perceived...
Redazione RHC - 13 January 2026
EDRStartupHinder: Bypassing Windows EDR Security with BindLink Cybercrime

EDRStartupHinder: Bypassing Windows EDR Security with BindLink

Sometimes, to disable Windows protection , you don't need to attack the antivirus directly. Simply preventing it from starting properly...
Redazione RHC - 13 January 2026
Burnout in Cybersecurity: The Hidden Risk to Your Organization Culture

Burnout in Cybersecurity: The Hidden Risk to Your Organization

In the world of cybersecurity, we often talk about attacks, vulnerabilities, and incidents. Less is said about a silent variable...
Paloma Donadi - 13 January 2026
APT28 Phishing Campaign: Credential Harvesting Tactics Cybercrime

APT28 Phishing Campaign: Credential Harvesting Tactics

The threat actor APT28 , classified as an Advanced Persistent Threat, active since at least 2004, identified by the alias...
Lorenzo Nardi - 13 January 2026
Iran Cyber Crisis: Connettività Compromised Cybercrime

Iran Cyber Crisis: Connettività Compromised

Sometimes important things don't arrive at a press conference. They arrive like a graph that stops breathing: the connectivity line...
Roberto Villani - 13 January 2026

1X NEO Robot Unveils World Model for Advanced Learning

1X has released a major update for its NEO humanoid robot , not promising much but introducing a significant change to its learning logic. The new module, called 1X World...
Share on Facebook Share on LinkedIn Share on X

Cybercrime Meets Real-Life Violence: Foxtrot Network’s Dark Side

In recent months, there has been increasing talk of a paradigm shift in cybercrime . What for years was perceived as a predominantly digital ecosystem— consisting of fraud, identity theft,...
Share on Facebook Share on LinkedIn Share on X

EDRStartupHinder: Bypassing Windows EDR Security with BindLink

Sometimes, to disable Windows protection , you don't need to attack the antivirus directly. Simply preventing it from starting properly is sufficient. A researcher who goes by the name Two...
Share on Facebook Share on LinkedIn Share on X

Burnout in Cybersecurity: The Hidden Risk to Your Organization

In the world of cybersecurity, we often talk about attacks, vulnerabilities, and incidents. Less is said about a silent variable that runs through the entire sector: fatigue . Not end-of-day...
Share on Facebook Share on LinkedIn Share on X

APT28 Phishing Campaign: Credential Harvesting Tactics

The threat actor APT28 , classified as an Advanced Persistent Threat, active since at least 2004, identified by the alias BlueDelta, but even better known under the name IRON TWILIGHT...
Share on Facebook Share on LinkedIn Share on X

Iran Cyber Crisis: Connettività Compromised

Sometimes important things don't arrive at a press conference. They arrive like a graph that stops breathing: the connectivity line collapses, the OSINT dries up, the noise grows as the...
Share on Facebook Share on LinkedIn Share on X

ServiceNow AI Vulnerability CVE-2025-12420: Critical Security Risk

A critical flaw has been identified in ServiceNow's artificial intelligence platform, with a severity score of 9.3 out of 10. This vulnerability, classified as CVE-2025-12420, could allow attackers to impersonate...
Share on Facebook Share on LinkedIn Share on X

Microsoft Expands Global Network with New Undersea Fiber Optic Cables

In May 2015, Microsoft announced a series of strategic agreements to strengthen its global network infrastructure with new submarine fiber optic cables . This initiative is part of a broader...
Share on Facebook Share on LinkedIn Share on X

Poisoning AI Data: The New Threat to Machine Learning Models

A bold new initiative has been launched in the artificial intelligence industry to weaken machine learning models by deliberately distorting the data used to train them. The project, called Poison...
Share on Facebook Share on LinkedIn Share on X

Pig Butchering Scams Evolve with PBaaS: The New Threat

Online scams known as "pig butchering" are undergoing a profound transformation. From artisanal and disorganized operations , based on makeshift call centers, they have become a structured, scalable, and highly...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Cybercrime Meets Real-Life Violence: Foxtrot Network’s Dark Side
Redazione RHC - 13/01/2026

In recent months, there has been increasing talk of a paradigm shift in cybercrime . What for years was perceived as a predominantly digital ecosystem— consisting of fraud, identity theft, online extortion, and cyberattacks —is…

Immagine del sitoCybercrime
Iran Cyber Crisis: Connettività Compromised
Roberto Villani - 13/01/2026

Sometimes important things don’t arrive at a press conference. They arrive like a graph that stops breathing: the connectivity line collapses, the OSINT dries up, the noise grows as the signal disappears. In Iran, the…

Vulnerability
ServiceNow AI Vulnerability CVE-2025-12420: Critical Security Risk
Redazione RHC - 13/01/2026

A critical flaw has been identified in ServiceNow’s artificial intelligence platform, with a severity score of 9.3 out of 10. This vulnerability, classified as CVE-2025-12420, could allow attackers to impersonate legitimate users without authenticating. ServiceNow…

Immagine del sitoCybercrime
CRISPR-Cas13: Breakthrough in Flu Treatment with Gene Editing
Redazione RHC - 12/01/2026

Influenza remains one of the most stubborn and unpleasant infections on the planet. It returns every winter, mutating, evading the immune system, and eventually becoming drug-resistant. Now, scientists are proposing an unexpected approach that could…

Immagine del sitoCybercrime
Internet Shutdowns Cost $19.7B in 2025, Sophisticated Censorship Rises
Redazione RHC - 11/01/2026

Imagine a situation where the internet appears to be working, but websites won’t open beyond the first screen, messaging apps are intermittent, and businesses are constantly changing. According to the authors of a recent annual…