Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320x100 Itcentric
LECS 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Burnout in Cybersecurity: The Hidden Risk to Your Organization Culture

Burnout in Cybersecurity: The Hidden Risk to Your Organization

In the world of cybersecurity, we often talk about attacks, vulnerabilities, and incidents. Less is said about a silent variable...
Paloma Donadi - 13 January 2026
APT28 Phishing Campaign: Credential Harvesting Tactics Cybercrime

APT28 Phishing Campaign: Credential Harvesting Tactics

The threat actor APT28 , classified as an Advanced Persistent Threat, active since at least 2004, identified by the alias...
Lorenzo Nardi - 13 January 2026
Iran Cyber Crisis: Connettività Compromised Cybercrime

Iran Cyber Crisis: Connettività Compromised

Sometimes important things don't arrive at a press conference. They arrive like a graph that stops breathing: the connectivity line...
Roberto Villani - 13 January 2026
Vulnerability

ServiceNow AI Vulnerability CVE-2025-12420: Critical Security Risk

A critical flaw has been identified in ServiceNow's artificial intelligence platform, with a severity score of 9.3 out of 10....
Redazione RHC - 13 January 2026
Microsoft Expands Global Network with New Undersea Fiber Optic Cables Cybercrime

Microsoft Expands Global Network with New Undersea Fiber Optic Cables

In May 2015, Microsoft announced a series of strategic agreements to strengthen its global network infrastructure with new submarine fiber...
Redazione RHC - 13 January 2026
Poisoning AI Data: The New Threat to Machine Learning Models Cybercrime

Poisoning AI Data: The New Threat to Machine Learning Models

A bold new initiative has been launched in the artificial intelligence industry to weaken machine learning models by deliberately distorting...
Redazione RHC - 12 January 2026

Instagram Data Leak Exposes 17.5 Million Users on Dark Web

A massive digital archive containing the private information of approximately 17.5 million Instagram users appears to have fallen into the hands of cybercriminals. A few hours ago, the alarm was...
Share on Facebook Share on LinkedIn Share on X

Phishing Emails Mimic Internal Comms via Microsoft 365 Spoofing

Phishing attacks are becoming increasingly insidious, to the point of perfectly mimicking internal corporate communications . This is the alarm raised by Microsoft, which has observed a significant increase in...
Share on Facebook Share on LinkedIn Share on X

Lovense Emily AI Doll: Revolutionary Companion at CES 2026

At CES 2026 in Las Vegas, Lovense , known for its app-controlled smart toys for adults , decided to make a bold statement in a completely different format . Instead...
Share on Facebook Share on LinkedIn Share on X

HPE OneView Critical Vulnerability Exploited: Update Now to Prevent Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) of the United States of America has raised the alarm about the active exploitation of a critical vulnerability in HPE OneView , an...
Share on Facebook Share on LinkedIn Share on X

Undertow Vulnerability CVE-2025-12543 Exposes Java Ecosystem to Critical Security Risks

A flaw has been discovered in the foundation of the Java web ecosystem. Undertow , the high-performance web server that powers enterprise heavyweights like WildFly and JBoss EAP , has...
Share on Facebook Share on LinkedIn Share on X

The Revolutionary iPhone Launch: A Game-Changing Moment in Tech History

San Francisco: January 9, 2007 There was something strange about the air, like when you know something's about to happen but you don't know what. Steve Jobs was on stage...
Share on Facebook Share on LinkedIn Share on X

Cloudflare Hit with €14M Fine for Failing to Block Pirate Content

The Italian Communications Regulatory Authority (AGCOM) has imposed an administrative fine exceeding €14 million on Cloudflare Inc. for failure to comply with Italian legislation against online piracy. The measure was...
Share on Facebook Share on LinkedIn Share on X

Iran Protests Escalate as Reza Pahlavi Calls for Action Against Government

Iranian protesters chanted and marched through the streets until Friday morning, following a call from exiled former Prince Reza Pahlavi to demonstrate, despite the Iranian theocracy cutting off the country...
Share on Facebook Share on LinkedIn Share on X

Taiwan Citizens Accused in China of Smuggling and Cable Sabotage

Chinese authorities have formally charged two Taiwanese citizens with involvement in a smuggling operation linked to an incident in February that damaged an undersea cable and fueled renewed tensions between...
Share on Facebook Share on LinkedIn Share on X

QR Code Phishing via HTML: New Attack Vector Emerges

We know that criminal hackers always manage to surprise us, and this time too they surprise us with the innovation and ways they invent to overcome obstacles, such as anti-spam...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
VoidLink Malware: Advanced Linux Framework Targets Cloud Infrastructures
Redazione RHC - 16/01/2026

Check Point researchers have discovered a new Linux infection framework distinguished by its advanced modular architecture and wide range of features. The malware has been dubbed VoidLink . The framework is composed of over 30…

Immagine del sitoCybercrime
Microsoft Copilot Vulnerability Exposes User Data to Hackers
Redazione RHC - 15/01/2026

A recently fixed vulnerability allowed attackers to exploit Microsoft Copilot Personal with a single click to steal sensitive user data. Using a phishing link, attackers were able to take control of sessions without requiring further…

Immagine del sitoCybercrime
Progress Software Patches LoadMaster, MOVEit WAF Vulnerabilities
Redazione RHC - 15/01/2026

On January 12, 2026, Progress Software Corporation released patches that address two high-severity Command Injection vulnerabilities, which could allow remote attackers to execute malicious code on LoadMaster load balancers and MOVEit Web Application Firewalls (WAFs).…

Immagine del sitoCybercrime
24-Year-Old Hacker Breaches US Supreme Court Database
Redazione RHC - 14/01/2026

Do you remember the 24-year-old hacker Carmelo Miano and the breaches of the Naples Prosecutor’s Office’s accounts and computer systems? It appears something similar happened in the United States, and the other young man is…

Immagine del sitoCybercrime
Cloudflare vs Italy: The Battle for Internet Freedom and DNS Control
Redazione RHC - 14/01/2026

Cloudflare CEO Matthew Prince has threatened to shut down the company’s operations in Italy after the country’s telecom regulator fined it twice its annual revenue in the country. The facts The conflict erupted around Italy’s…