Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

TM RedHotCyber 970x120 042543
Precedente Successivo

Latest news

Cisco Zero-Day Vulnerability CVE-2026-20045 Actively Exploited Vulnerability

Cisco Zero-Day Vulnerability CVE-2026-20045 Actively Exploited

A critical zero-day remote code execution (RCE) vulnerability, identified as CVE-2026-20045, has been discovered by Cisco and is being actively...
Agostino Pellegrino - January 22, 2026
Cybersecurity in Local Administrations: The Hidden Risk Cybercrime

Cybersecurity in Local Administrations: The Hidden Risk

There's a convenient misconception in Italy: thinking that cybersecurity is a matter for ministries or large strategic players. It's reassuring....
Roberto Villani - January 22, 2026
UK Organizations Hit by Russia-Backed DDoS Attacks Cyber News

UK Organizations Hit by Russia-Backed DDoS Attacks

The UK's National Cyber Security Centre has issued a strong warning regarding a series of denial-of-service (DDoS) attacks targeting British...
Redazione RHC - January 22, 2026
GitLab Security Update Fixes Critical Vulnerabilities CVE-2026-0723 Cyber News

GitLab Security Update Fixes Critical Vulnerabilities CVE-2026-0723

An urgent security update has been released by GitLab for the Community (CE) and Enterprise (EE) editions to address several...
Massimiliano Brolli - January 21, 2026
Critical Telnetd Vulnerability in GNU InetUtils Allows Root Access Cyber News

Critical Telnetd Vulnerability in GNU InetUtils Allows Root Access

A critical security flaw has been discovered in the telnetd server component of GNU InetUtils, involving remote authentication bypass ....
Agostino Pellegrino - January 21, 2026
Everest Ransomware Attacks McDonald’s, 861GB Data Stolen Cyber News

Everest Ransomware Attacks McDonald’s, 861GB Data Stolen

Yesterday, the Everest cybercriminal gang claimed responsibility for a cyberattack on McDonald's on their Data Leak Site (DLS) . From...
Redazione RHC - January 21, 2026

VMware ESXi VM Escape Exploit: Advanced Threats Revealed

A new report published by the Huntress Tactical Response Team documents a highly sophisticated intrusion detected in December 2025 , in which an advanced actor managed to compromise a VMware...

Supply Chain Security: Protect Your Business from Cyber Threats

In an increasingly interconnected digital ecosystem, companies depend on networks of suppliers and partners to operate efficiently. However, this interdependence has transformed the supply chain into a new critical cybersecurity...

CVE-2026-21858: n8n Vulnerability Exposes Thousands of Servers to RCE

The vulnerability, identified as CVE-2026-21858, which we recently reported on, affects approximately 100,000 servers worldwide, threatening to expose proprietary API keys, customer databases, and AI workflows. The vulnerability, with a...

Malware PHALT#BLYX Uses Social Engineering and MSBuild to Infect Systems

A cancellation message from Booking.com with a high penalty seems like a typical business practice for hotels and apartments. But it's precisely this type of email that triggered a new...

DevSecOps: Integrating Security into Your Development Process

When it comes to application security, there's rarely a single problem. It's almost always a chain of small flaws, poor decisions, and missing controls that, when added together, pave the...

Critical RCE Vulnerability in D-Link DSL Routers – Update Now

A critical remote code execution (RCE) flaw in older D-Link DSL routers has been identified as CVE-2026-0625, with a CVSS v4.0 score of 9.3, indicating a high risk for users...

LED Data Transmission System for Smart Traffic

Researchers at Tokyo Polytechnic University have presented a simple and cost-effective wireless data transmission system using LEDs. The project boasts stable outdoor operation, even in bright sunlight, and could form...

Microsoft’s AI Future: Models to Systems with Satya Nadella

With 2026 just around the corner, Microsoft CEO Satya Nadella shared a thoughtful reflection on the state of the AI industry on SN Scratchpad , his new personal blog. In...

Patchwork Group Unleashes StreamSpy Malware with WebSocket C2 Channel

The Patchwork hacker group, also known as Dropping Elephant and Maha Grass , has returned to the spotlight after a series of targeted attacks on Pakistani defense facilities. In their...

China Achieves Quantum Error Correction Breakthrough with Microchip

For years, quantum computers have seemed like a futuristic technology: on paper, they can solve problems that classical machines can’t handle in a reasonable time, but in reality they constantly...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE