Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

TM RedHotCyber 970x120 042543
Precedente Successivo

Latest news

Fortinet Vulnerability CVE-2026-24858: Hackers Inside Networks with Legitimate Credentials Cyber News

Fortinet Vulnerability CVE-2026-24858: Hackers Inside Networks with Legitimate Credentials

A serious flaw, classified as CVE-2026-24858, has been confirmed to be exploited in real-world attacks against vulnerable devices. This isn't...
Bajram Zeqiri - January 28, 2026
NSA publishes first operational guidelines on Zero Trust Cyberpolitics

NSA publishes first operational guidelines on Zero Trust

The U.S. National Security Agency (NSA) has released the first two documents in its Zero Trust Implementation Guidelines (ZIGs) series,...
Silvia Felici - January 28, 2026
Beware of WhatsApp groups: An image can compromise your smartphone. Cyber News

Beware of WhatsApp groups: An image can compromise your smartphone.

WhatsApp is going through a very turbulent period. While many users still consider Meta's app a standard for mass messaging...
Redazione RHC - January 27, 2026
Linux: A “ghost” kernel bug discovered that had been lurking since 2020! Cyber News

Linux: A “ghost” kernel bug discovered that had been lurking since 2020!

A significant vulnerability has been discovered in the Linux kernel, hidden for years in one of the most critical architectural...
Agostino Pellegrino - January 27, 2026
Ransomware doesn’t lock servers, it locks credit. The financial side of cybersecurity Culture

Ransomware doesn’t lock servers, it locks credit. The financial side of cybersecurity

There's this mistaken—somewhat romantic, if you will—idea that ransomware is "IT stuff": a few servers in trouble, a couple of...
Antonio Piovesan - January 27, 2026
AI Isn’t as Reliable as You Think: The Hidden Risks of LLMs Without Good Governance innovation

AI Isn’t as Reliable as You Think: The Hidden Risks of LLMs Without Good Governance

Adopting large language models (LLMs) without adequate governance, verification, and oversight risks legal, financial, and reputational damage. This data emerges...
Silvia Felici - January 27, 2026

Microsoft Teams will know where you are: your geographic location will be inferred from your Wi-Fi

Microsoft is preparing to introduce an update that will transform a small manual habit into a system-wide automation. Soon, Microsoft Teams will be able to infer and display a user's...

CISA alert: Exploit underway against VMware vCenter. Risk of RCE without authentication.

The critical vulnerability recently added to the Cybersecurity and Infrastructure Security Agency (CISA) catalog of known exploited vulnerabilities (KEVs) affects the Broadcom VMware vCenter Server and is being actively exploited...

Linux 7.0 says goodbye to the HIPPI relic: a piece of supercomputing history has been eliminated.

The Linux kernel has long been a well-established reality, and while it still contains code for technologies no longer in use, it's likely that some people still rely on these...

The Grok scandal: 3 million sexually explicit images generated in 11 days

A recent study reveals that in just 11 days of processing, Grok produced approximately 3 million sexually explicit images. The data regarding approximately 23,000 images depicting minors is particularly concerning....

“I Stole 120,000 Bitcoins”: The Confession of the Bitfinex Hacker Who Now Wants to Defend Cyberspace

The story ofIlya Lichtenstein, the hacker responsible for one of the largest cyber attacks ever carried out against cryptocurrencies, reads like an episode of a TV series, yet it is...

AGI: Google and Anthropic CEOs sound the alarm at Davos – the world won’t be ready!

If there were any doubts about whether the world's leading AI companies agreed on the direction of AI, or how quickly it should get there, those doubts were dispelled at...

A working browser built with AI using 3 million lines of code: breakthrough or illusion?

A week ago, Cursor CEO Michael Truell announced a supposedly remarkable achievement. He claimed that, using GPT-5.2, Cursor had created a browser capable of running continuously for an entire week....

Kimwolf: The IoT botnet that moves silently across corporate and government networks

The Kimwolf botnet represents one of the most insidious IoT threats to emerge recently. According to the latest analyses, this malicious infrastructure has already compromised over two million devices ,...

NoName057(16) hits Italy 487 times in the last 3 months: the DDoS wave does not stop

Italy has confirmed itself as one of the main targets of the DDoS attack campaign carried out by the hacktivist group NoName057(16) . According to what was declared directly by...

Undersea Cables: Ignored Warnings and Uncertain Trials. The Truth About Underwater Accidents

In recent years, Taiwan has seen a series of incidents in which its undersea cables have been damaged or destroyed, creating damage to critical infrastructure and political tensions. The Control...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE