Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320x100 Itcentric
UtiliaCS 970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

From Zero-Day Exploits to Hidden Tunnels: How UAT-8837 Operates Cybercrime

From Zero-Day Exploits to Hidden Tunnels: How UAT-8837 Operates

Since early 2025, Cisco Talos specialists have detected the activity of the UAT-8837 group, which they attribute to China based...
Redazione RHC - 17 January 2026
Gootloader Malware Returns with Enhanced Evasion Techniques Cybercrime

Gootloader Malware Returns with Enhanced Evasion Techniques

After a long period of silence, the Gootloader downloader malware has returned to the forefront. Last November, the Huntress team...
Redazione RHC - 17 January 2026
US Considers Ramping Up Cyber Offensive Ops to Counter China Threats Cybercrime

US Considers Ramping Up Cyber Offensive Ops to Counter China Threats

U.S. authorities are actively discussing the need to strengthen offensive cyber activities in the face of ongoing attacks on the...
Redazione RHC - 17 January 2026
French Police Cyberattack Exposed: Weak Passwords Led to Data Breach Cybercrime

French Police Cyberattack Exposed: Weak Passwords Led to Data Breach

During a hearing in the French Senate, Interior Minister Laurent Nuñez detailed the details of the cyberattack that hit his...
Redazione RHC - 17 January 2026
Cisco Zero-Day Vulnerability Exploited: Secure Email Gateway Under Attack Cybercrime

Cisco Zero-Day Vulnerability Exploited: Secure Email Gateway Under Attack

Cisco has confirmed that a critical zero-day security flaw, allowing remote code execution, is currently being actively exploited in its...
Redazione RHC - 16 January 2026
AWS CodeBuild Vulnerability Exposed: CodeBreach Threat Revealed Cybercrime

AWS CodeBuild Vulnerability Exposed: CodeBreach Threat Revealed

Security researchers at Wiz have discovered a critical vulnerability in the AWS CodeBuild service that could allow an attacker to...
Redazione RHC - 16 January 2026

From Zero-Day Exploits to Hidden Tunnels: How UAT-8837 Operates

Since early 2025, Cisco Talos specialists have detected the activity of the UAT-8837 group, which they attribute to China based on techniques and infrastructure similar to other well-known operators in...
Share on Facebook Share on LinkedIn Share on X

Gootloader Malware Returns with Enhanced Evasion Techniques

After a long period of silence, the Gootloader downloader malware has returned to the forefront. Last November, the Huntress team detected a new campaign signaling the return of a developer...
Share on Facebook Share on LinkedIn Share on X

US Considers Ramping Up Cyber Offensive Ops to Counter China Threats

U.S. authorities are actively discussing the need to strengthen offensive cyber activities in the face of ongoing attacks on the country's critical infrastructure . During a hearing of the House...
Share on Facebook Share on LinkedIn Share on X

French Police Cyberattack Exposed: Weak Passwords Led to Data Breach

During a hearing in the French Senate, Interior Minister Laurent Nuñez detailed the details of the cyberattack that hit his ministry, immediately clarifying that some of the information remains covered...
Share on Facebook Share on LinkedIn Share on X

Cisco Zero-Day Vulnerability Exploited: Secure Email Gateway Under Attack

Cisco has confirmed that a critical zero-day security flaw, allowing remote code execution, is currently being actively exploited in its Secure Email Gateway and Secure Email and Web Manager devices....
Share on Facebook Share on LinkedIn Share on X

AWS CodeBuild Vulnerability Exposed: CodeBreach Threat Revealed

Security researchers at Wiz have discovered a critical vulnerability in the AWS CodeBuild service that could allow an attacker to take complete control of Amazon's GitHub repositories and potentially compromise...
Share on Facebook Share on LinkedIn Share on X

Microsoft Patches Zero-Day NTFS Vulnerabilities in Windows 11 and Server

Microsoft released a security update in January that addresses two serious zero-day vulnerabilities in the NTFS file system. The vulnerabilities affected more than thirty versions of desktop and server operating...
Share on Facebook Share on LinkedIn Share on X

AVCheck Malware Service Shut Down: Dutch Man Arrested for Cybercrime

Law enforcement has announced the arrest of a 33-year-old Dutch citizen on suspicion of operating the AVCheck platform, an online anti-malware testing service that was shut down last May during...
Share on Facebook Share on LinkedIn Share on X

VoidLink Malware: Advanced Linux Framework Targets Cloud Infrastructures

Check Point researchers have discovered a new Linux infection framework distinguished by its advanced modular architecture and wide range of features. The malware has been dubbed VoidLink . The framework...
Share on Facebook Share on LinkedIn Share on X

Microsoft Ends Support for Windows Server 2008: What It Means

This week marked the end of an era: Microsoft finally ended support for Windows Server 2008 , the operating system based on Windows Vista. The server operating system, codenamed Longhorn...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Gootloader Malware Returns with Enhanced Evasion Techniques
Redazione RHC - 17/01/2026

After a long period of silence, the Gootloader downloader malware has returned to the forefront. Last November, the Huntress team detected a new campaign signaling the return of a developer previously associated with the Vanilla…

Immagine del sitoCybercrime
VoidLink Malware: Advanced Linux Framework Targets Cloud Infrastructures
Redazione RHC - 16/01/2026

Check Point researchers have discovered a new Linux infection framework distinguished by its advanced modular architecture and wide range of features. The malware has been dubbed VoidLink . The framework is composed of over 30…

Immagine del sitoCybercrime
Microsoft Copilot Vulnerability Exposes User Data to Hackers
Redazione RHC - 15/01/2026

A recently fixed vulnerability allowed attackers to exploit Microsoft Copilot Personal with a single click to steal sensitive user data. Using a phishing link, attackers were able to take control of sessions without requiring further…

Immagine del sitoCybercrime
Progress Software Patches LoadMaster, MOVEit WAF Vulnerabilities
Redazione RHC - 15/01/2026

On January 12, 2026, Progress Software Corporation released patches that address two high-severity Command Injection vulnerabilities, which could allow remote attackers to execute malicious code on LoadMaster load balancers and MOVEit Web Application Firewalls (WAFs).…

Immagine del sitoCybercrime
24-Year-Old Hacker Breaches US Supreme Court Database
Redazione RHC - 14/01/2026

Do you remember the 24-year-old hacker Carmelo Miano and the breaches of the Naples Prosecutor’s Office’s accounts and computer systems? It appears something similar happened in the United States, and the other young man is…