Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

HackTheBox 970x120 1

Latest news

Critical Telnetd Vulnerability in GNU InetUtils Allows Root Access Cyber News

Critical Telnetd Vulnerability in GNU InetUtils Allows Root Access

A critical security flaw has been discovered in the telnetd server component of GNU InetUtils, involving remote authentication bypass ....
Agostino Pellegrino - January 21, 2026
VoidLink Malware: AI-Generated Threat for Linux Systems Cyber News

VoidLink Malware: AI-Generated Threat for Linux Systems

We had already talked about VoidLink a few days ago , it is a framework composed of over 30 modules...
Agostino Pellegrino - January 20, 2026
Critical Vulnerability in Modular DS WordPress Plugin – Update Now Cyber News

Critical Vulnerability in Modular DS WordPress Plugin – Update Now

A high-severity security vulnerability has been identified in the WordPress plugin "Modular DS (Modular Connector)," and numerous security reports suggest...
Manuel Roccon - January 18, 2026
French Police Cyberattack Exposed: Weak Passwords Led to Data Breach Cyber News

French Police Cyberattack Exposed: Weak Passwords Led to Data Breach

During a hearing in the French Senate, Interior Minister Laurent Nuñez detailed the details of the cyberattack that hit his...
Redazione RHC - January 17, 2026
Microsoft Patches Zero-Day NTFS Vulnerabilities in Windows 11 and Server Cyber News

Microsoft Patches Zero-Day NTFS Vulnerabilities in Windows 11 and Server

Microsoft released a security update in January that addresses two serious zero-day vulnerabilities in the NTFS file system. The vulnerabilities...
Pietro Melillo - January 16, 2026
AVCheck Malware Service Shut Down: Dutch Man Arrested for Cybercrime Cyber News

AVCheck Malware Service Shut Down: Dutch Man Arrested for Cybercrime

Law enforcement has announced the arrest of a 33-year-old Dutch citizen on suspicion of operating the AVCheck platform, an online...
Redazione RHC - January 16, 2026
Microsoft Ends Support for Windows Server 2008: What It Means Cyber News

Microsoft Ends Support for Windows Server 2008: What It Means

This week marked the end of an era: Microsoft finally ended support for Windows Server 2008 , the operating system...
Redazione RHC - January 16, 2026
The AI Energy Crisis: How Data Centers Are Reshaping US Power Costs Cyber News

The AI Energy Crisis: How Data Centers Are Reshaping US Power Costs

The accelerated growth of artificial intelligence is bringing with it an increasingly obvious consequence : rising energy demand. This issue...
Luca Vinciguerra - January 15, 2026
ARM: The Future of Low-Power Computing and AI Cyber News

ARM: The Future of Low-Power Computing and AI

Just look around and you'll almost certainly find a device nearby that uses a processor based on the same design:...
Redazione RHC - January 15, 2026
Meta Shifts Focus from Metaverse to AI-Powered Wearables Cyber News

Meta Shifts Focus from Metaverse to AI-Powered Wearables

Meta is launching a new internal reorganization process that directly involves Reality Labs, its virtual reality division, and the Metaverse....
Redazione RHC - January 14, 2026
China Leads the Way with Level 3 Autonomous Vehicle License Plates Cyber News

China Leads the Way with Level 3 Autonomous Vehicle License Plates

On December 23, the Traffic Management Bureau of the Beijing Municipal Public Security Bureau officially issued the first batch of...
Redazione RHC - January 14, 2026
Understanding Data Breach: Protecting Sensitive Information Culture

Understanding Data Breach: Protecting Sensitive Information

One of the most common mistakes, despite the GDPR's implementation since 2018, is to consider only security breaches involving sensitive...
Stefano Gazzella - January 14, 2026

NSA publishes first operational guidelines on Zero Trust

The U.S. National Security Agency (NSA) has released the first two documents in its Zero Trust Implementation Guidelines (ZIGs) series, aimed at providing practical and operational guidance to support organizations...

Ransomware doesn’t lock servers, it locks credit. The financial side of cybersecurity

There's this mistaken—somewhat romantic, if you will—idea that ransomware is "IT stuff": a few servers in trouble, a couple of sleepless nights, then you restart and it's over… The reality,...

AI Isn’t as Reliable as You Think: The Hidden Risks of LLMs Without Good Governance

Adopting large language models (LLMs) without adequate governance, verification, and oversight risks legal, financial, and reputational damage. This data emerges from the report "Risks of Unmanaged AI Reliance: Evaluating Regional...

Active Defense and Hackback: The Legal Labyrinth of Cybersecurity

In our previous article, we explored how the cybersecurity professional's role as guarantor clashes with classic scenarios such as unauthorized access. However, in my professional and academic experience, I often...

And let the phishing begin! Microsoft is taking action against a zero-day exploit already exploited in Office

Once again, Microsoft was forced to quickly fix some flaws. The company has released unscheduled patches for Microsoft Office, addressing a dangerous zero-day vulnerability that has already been exploited in...

ServiceNow Under Attack: How an Email Can Open the Doors to Your Business

The recent discovery of a vulnerability in ServiceNow’s AI platform has shaken the cybersecurity industry. This flaw, characterized by an extremely high severity score, allowed unauthenticated attackers to impersonate any...

33,000 tons of iron… and an investigation where AIS and logs are cyber intelligence traps

A recent operation in the port of Brindisi, conducted by the Guardia di Finanza in collaboration with the Customs and Monopolies Agency (ADM) and coordinated by the Brindisi Public Prosecutor's...

Email Security Under Pressure: Phishing Kits to Double in 2025

According to Barracuda’s Phishing Report 2025 , the number of phishing-as-a-service (PhaaS) kits is expected to double by 2025, placing increasing pressure on security teams to combat an increasingly evolving...

How a simple Visual Studio Code file can become a backdoor for state-run hackers

Security researchers have recently observed a worrying evolution in the offensive tactics attributed to North Korean-linked actors as part of the campaign known as Contagious Interview : no longer simple...

Khaby Lame is selling the rights to his digital identity for $900 million. But there’s reason to think.

Khaby Lame, the world's most followed Italian creator and now a global social media icon, has taken a step that could mark a turning point in the history of the...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE