Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Enterprise BusinessLog 320x200 1
UtiliaCS 970x120

Red Hot Cyber. The Cybersecurity Blog

Precedente Successivo

Ultime news

Net-NTLMv1 Exploitation: Rainbow Tables for Modern Attacks Cyber News

Net-NTLMv1 Exploitation: Rainbow Tables for Modern Attacks

Mandiant has released a large set of rainbow tables dedicated to Net-NTLMv1 with the aim of concretely demonstrating how insecure...
Redazione RHC - 18 January 2026
Critical Vulnerability in Modular DS WordPress Plugin – Update Now Cyber News

Critical Vulnerability in Modular DS WordPress Plugin – Update Now

A high-severity security vulnerability has been identified in the WordPress plugin "Modular DS (Modular Connector)," and numerous security reports suggest...
Manuel Roccon - 18 January 2026
Your paycheck is zero! Congratulations, someone answered the phone wrong Cyber News

Your paycheck is zero! Congratulations, someone answered the phone wrong

No worker would accept their paycheck disappearing without explanation. It was precisely from a series of internal reports of this...
Redazione RHC - 18 January 2026
Two Ukrainians Suspected in Black Basta Ransomware Attacks Cybercrime

Two Ukrainians Suspected in Black Basta Ransomware Attacks

When it comes to cybersecurity, it's not uncommon to come across news stories that seem straight out of a science...
Pietro Melillo - 17 January 2026
From Zero-Day Exploits to Hidden Tunnels: How UAT-8837 Operates Cyber News

From Zero-Day Exploits to Hidden Tunnels: How UAT-8837 Operates

Since early 2025, Cisco Talos specialists have detected the activity of the UAT-8837 group, which they attribute to China based...
Agostino Pellegrino - 17 January 2026
Gootloader Malware Returns with Enhanced Evasion Techniques Cybercrime

Gootloader Malware Returns with Enhanced Evasion Techniques

After a long period of silence, the Gootloader downloader malware has returned to the forefront. Last November, the Huntress team...
Massimiliano Brolli - 17 January 2026

Pig Butchering Scams Evolve with PBaaS: The New Threat

Online scams known as "pig butchering" are undergoing a profound transformation. From artisanal and disorganized operations , based on makeshift call centers, they have become a structured, scalable, and highly...

Apache Struts 2 Vulnerability CVE-2025-68493 Exposes Sensitive Data

A new flaw has emerged in the foundation of one of the most popular Java frameworks on the web. Cybersecurity experts at ZAST.AI have discovered a significant security flaw in...

CRISPR-Cas13: Breakthrough in Flu Treatment with Gene Editing

Influenza remains one of the most stubborn and unpleasant infections on the planet. It returns every winter, mutating, evading the immune system, and eventually becoming drug-resistant. Now, scientists are proposing...

Uncovering Dark AI: The Truth Behind Crime-as-a-Service Chatbots

In recent months, the cybersecurity landscape has been awash with media hype surrounding new AI Dark Chatbots promoted as "Crime-as-a-Service" services on Telegram and the Dark Web. These platforms are...

AI-Generated Mac Malware: SimpleStealth Threatens User Security

A group of industry specialists has identified for the first time a macOS malware whose code clearly shows signs of having been generated using artificial intelligence tools . The discovery,...

Linus Torvalds on AI Coding: ‘It’s Just Another Tool’

Linus Torvalds, the creator of Linux, has expressed a firm and uncompromising position regarding the debate over the integration and use of artificial intelligence tools in writing and reviewing Linux...

The Future of Tech: Sovereignty, Security, and Cloud Control

In today's world, technology is no longer a mere tool for efficiency or convenience, but a primary geopolitical lever . Access to digital infrastructure, cloud platforms, and communications systems isn't...

Internet Shutdowns Cost $19.7B in 2025, Sophisticated Censorship Rises

Imagine a situation where the internet appears to be working, but websites won't open beyond the first screen, messaging apps are intermittent, and businesses are constantly changing. According to the...

Doom on a Smart Pressure Cooker: The Ultimate IoT Hack

The line between home appliances and gaming consoles continues to blur. The latest frontier of " extreme porting" features the Krups Cook4Me Connect , a smart pressure cooker that's been...

LockBit 5.0 Ransomware: The Evolving Threat

Cybercrime continues to reinvent itself, and LockBit is one of the most prominent examples. Active since late 2019, the group has become one of the most prolific ransomware operators ever...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCyber News
And let the phishing begin! Microsoft is taking action against a zero-day exploit already exploited in Office
Pietro Melillo - 27/01/2026

Once again, Microsoft was forced to quickly fix some flaws. The company has released unscheduled patches for Microsoft Office, addressing a dangerous zero-day vulnerability that has already been exploited in cyberattacks. The issue, identified as…

Immagine del sitoCyber News
ServiceNow Under Attack: How an Email Can Open the Doors to Your Business
Redazione RHC - 27/01/2026

The recent discovery of a vulnerability in ServiceNow’s AI platform has shaken the cybersecurity industry. This flaw, characterized by an extremely high severity score, allowed unauthenticated attackers to impersonate any corporate user. To launch the…

Immagine del sitoCybercrime
149 Million Accounts Exposed: The Database No One Should Have Seen
Redazione RHC - 26/01/2026

A recent leak revealed 149 million logins and passwords exposed online , including accounts for financial services, social media, gaming, and dating sites. The discovery was made by researcher Jeremiah Fowler and shared with ExpressVPN.…

Immagine del sitoCybercrime
When Malware Hides in Videos! The PixelCode Technique Breaks the Rules
Marcello Filacchioni - 26/01/2026

PixelCode began as a research project exploring a hidden technique for storing binary data within images or videos . Instead of leaving a plaintext executable, the file is converted into pixel data, transforming each byte…

Immagine del sitoCyber News
How a simple Visual Studio Code file can become a backdoor for state-run hackers
Redazione RHC - 26/01/2026

Security researchers have recently observed a worrying evolution in the offensive tactics attributed to North Korean-linked actors as part of the campaign known as Contagious Interview : no longer simple fake job interview scams, but…