Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

UtiliaCS 970x120
Precedente Successivo

Latest news

Smartphones rented without your knowledge: Google dismantles a global proxy network Cybercrime

Smartphones rented without your knowledge: Google dismantles a global proxy network

Android has never been so exploited, at least according to the latest developments reported by a recent investigation. Google announced...
Bajram Zeqiri - January 29, 2026
AI doesn’t ask for permission: it’s rewriting the rules quickly and probably badly innovation

AI doesn’t ask for permission: it’s rewriting the rules quickly and probably badly

Artificial intelligence has entered the workplace without knocking. Not as a loud revolution, but as a constant presence, almost banal...
Massimiliano Brolli - January 29, 2026
Beware of “I am not a robot”: the malware trap that uses Google Calendar. Cybercrime

Beware of “I am not a robot”: the malware trap that uses Google Calendar.

A new threat is lurking, exploiting our greatest weakness: habit. How many times, in fact, do you find yourself clicking...
Bajram Zeqiri - January 29, 2026
WinRAR as a Weapon: Google Discovers a Vulnerability Exploited by APTs and Cybercriminals Cybercrime

WinRAR as a Weapon: Google Discovers a Vulnerability Exploited by APTs and Cybercriminals

The WinRAR security flaw, which emerged last summer, has become more widespread than expected. Several organizations, both common criminals and...
Bajram Zeqiri - January 29, 2026
Latin America under digital siege: the numbers that worry experts Culture

Latin America under digital siege: the numbers that worry experts

In recent months, Latin America and the Caribbean have become the most targeted region by cyberattacks globally, surpassing Africa in...
Marcello Filacchioni - January 29, 2026
A blow to the heart of cybercrime: RAMP taken offline. The “temple” of ransomware falls! Cybercrime

A blow to the heart of cybercrime: RAMP taken offline. The “temple” of ransomware falls!

The RAMP (Russian Anonymous Marketplace) forum, one of the main hubs of the international cybercrime underground, has been officially shut...
Bajram Zeqiri - January 28, 2026

And let the phishing begin! Microsoft is taking action against a zero-day exploit already exploited in Office

Once again, Microsoft was forced to quickly fix some flaws. The company has released unscheduled patches for Microsoft Office, addressing a dangerous zero-day vulnerability that has already been exploited in...

ServiceNow Under Attack: How an Email Can Open the Doors to Your Business

The recent discovery of a vulnerability in ServiceNow’s AI platform has shaken the cybersecurity industry. This flaw, characterized by an extremely high severity score, allowed unauthenticated attackers to impersonate any...

33,000 tons of iron… and an investigation where AIS and logs are cyber intelligence traps

A recent operation in the port of Brindisi, conducted by the Guardia di Finanza in collaboration with the Customs and Monopolies Agency (ADM) and coordinated by the Brindisi Public Prosecutor's...

Email Security Under Pressure: Phishing Kits to Double in 2025

According to Barracuda’s Phishing Report 2025 , the number of phishing-as-a-service (PhaaS) kits is expected to double by 2025, placing increasing pressure on security teams to combat an increasingly evolving...

How a simple Visual Studio Code file can become a backdoor for state-run hackers

Security researchers have recently observed a worrying evolution in the offensive tactics attributed to North Korean-linked actors as part of the campaign known as Contagious Interview : no longer simple...

Khaby Lame is selling the rights to his digital identity for $900 million. But there’s reason to think.

Khaby Lame, the world's most followed Italian creator and now a global social media icon, has taken a step that could mark a turning point in the history of the...

Microsoft Teams will know where you are: your geographic location will be inferred from your Wi-Fi

Microsoft is preparing to introduce an update that will transform a small manual habit into a system-wide automation. Soon, Microsoft Teams will be able to infer and display a user's...

Linux 7.0 says goodbye to the HIPPI relic: a piece of supercomputing history has been eliminated.

The Linux kernel has long been a well-established reality, and while it still contains code for technologies no longer in use, it's likely that some people still rely on these...

“I Stole 120,000 Bitcoins”: The Confession of the Bitfinex Hacker Who Now Wants to Defend Cyberspace

The story ofIlya Lichtenstein, the hacker responsible for one of the largest cyber attacks ever carried out against cryptocurrencies, reads like an episode of a TV series, yet it is...

A working browser built with AI using 3 million lines of code: breakthrough or illusion?

A week ago, Cursor CEO Michael Truell announced a supposedly remarkable achievement. He claimed that, using GPT-5.2, Cursor had created a browser capable of running continuously for an entire week....

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE