Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320x100 Itcentric
Redhotcyber Banner Sito 970x120px Uscita 101125

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Password Security: The Impact of Human Behavior on Password Strength Culture

Password Security: The Impact of Human Behavior on Password Strength

Password security and human behavior are more connected than we think. In previous episodes, we tried to shift our focus:...
Simone D'Agostino - 4 January 2026
Potential Data Breach at Pickett USA Exposes Critical Energy Infrastructure Cybercrime

Potential Data Breach at Pickett USA Exposes Critical Energy Infrastructure

An unknown attacker claims to have hacked Pickett and Associates (Pickett USA), a Florida-based engineering firm, and is now selling...
Redazione RHC - 4 January 2026
Forensic Timeliner: Advanced Digital Forensics Tool for DFIR Analysis Cybercrime

Forensic Timeliner: Advanced Digital Forensics Tool for DFIR Analysis

Forensic Timeliner is a high-performance forensic processing engine designed to support DFIR (Digital Forensics and Incident Response ) analysts in...
Redazione RHC - 4 January 2026
Google Unveils Nano Banana 2 Flash for Rapid Image Generation Cybercrime

Google Unveils Nano Banana 2 Flash for Rapid Image Generation

Google is preparing to introduce a new generative AI model for image processing: the Nano Banana 2 Flash . It...
Redazione RHC - 4 January 2026
Ancient Chinese Silk Loom: The World’s First Computer? Culture

Ancient Chinese Silk Loom: The World’s First Computer?

When you evaluate a computer not just by its outer casing and display, but fundamentally as a machine that accepts...
Redazione RHC - 3 January 2026
Neuralink’s Brain-Computer Implants to Revolutionize Human Life by 2026 Cybercrime

Neuralink’s Brain-Computer Implants to Revolutionize Human Life by 2026

Neuralink, Elon Musk's brain implant company, is preparing to realize what until recently seemed like science fiction. According to Musk,...
Redazione RHC - 3 January 2026

Browser-in-the-Browser Phishing Attack: How to Protect Yourself

This article analyzes a recent and sophisticated phishing campaign that uses the Browser-in-the-Browser (BitB) technique to steal credentials, particularly those from services like Microsoft 365. The BitB attack is notable...
Share on Facebook Share on LinkedIn Share on X

Critical WebKit Vulnerability Exposes iOS Devices to Code Execution

A new report details a critical vulnerability discovered by security researcher Joseph Goydish in Apple's WebKit engine. This security flaw, if exploited in conjunction with other exploits, could allow attackers...
Share on Facebook Share on LinkedIn Share on X

Xspeeder Devices Hit by AI-Discovered Zero-Day Vulnerability CVE-2025-54322

When it comes to cybersecurity, it's easy to fall into the trap of thinking that problems are always far away, that they only affect others. But the reality is that...
Share on Facebook Share on LinkedIn Share on X

TurboDiffusion: AI Video Generation Accelerated Up to 200 Times

Automatic video generation using artificial intelligence took a significant leap on December 25, 2025, when Tsinghua University announced the open source release of TurboDiffusion. The framework, developed by the TSAIL...
Share on Facebook Share on LinkedIn Share on X

OpenAI to Introduce ChatGPT Ads, Revolutionizing AI-Powered Marketing

OpenAI is once again discussing the possibility of introducing advertising into ChatGPT , this time in the form of so-called sponsored content. These aren't traditional banners, but content that could...
Share on Facebook Share on LinkedIn Share on X

Job Scams on Social Media: How to Avoid Fake Remote Job Offers

Fraudulent job ads promising easy money and remote work continue to flood social media, particularly in the Middle East and North Africa . Under the guise of part-time jobs that...
Share on Facebook Share on LinkedIn Share on X

MongoDB Vulnerability CVE-2025-14847: Critical Memory Disclosure Bug

As previously reported, a serious vulnerability has been discovered in MongoDB that allows a remote attacker, without authentication, to access uninitialized server memory. The vulnerability has been assigned the CVE-2025-14847...
Share on Facebook Share on LinkedIn Share on X

UK Boosts Subsea Cable Protection with Autonomous Vessels

The UK government has announced plans to strengthen the protection of undersea cables using autonomous vessels. Military ships and aircraft will also be involved in this "defense." The UK Ministry...
Share on Facebook Share on LinkedIn Share on X

China’s Humanoid Robot Industry Booms with UBtech’s Walker S2

A video, hundreds of humanoid robots, and a reaction that went viral. When UBtech demonstrated its S2 Walkers moving in unison in a Chinese warehouse, it was a stunning sight...
Share on Facebook Share on LinkedIn Share on X

Cyber Criminals Recruit Insiders: Companies at Risk of Internal Threats

The cybercriminal community is rapidly increasing its interest in recruiting personnel from within companies . Instead of sophisticated external attacks, criminals are increasingly relying on internal sources— people willing to...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Internet Shutdowns Cost $19.7B in 2025, Sophisticated Censorship Rises
Redazione RHC - 11/01/2026

Imagine a situation where the internet appears to be working, but websites won’t open beyond the first screen, messaging apps are intermittent, and businesses are constantly changing. According to the authors of a recent annual…

Immagine del sitoCybercrime
Instagram Data Leak Exposes 17.5 Million Users on Dark Web
Redazione RHC - 10/01/2026

A massive digital archive containing the private information of approximately 17.5 million Instagram users appears to have fallen into the hands of cybercriminals. A few hours ago, the alarm was raised after several Reddit users…

Immagine del sitoCybercrime
Undertow Vulnerability CVE-2025-12543 Exposes Java Ecosystem to Critical Security Risks
Redazione RHC - 09/01/2026

A flaw has been discovered in the foundation of the Java web ecosystem. Undertow , the high-performance web server that powers enterprise heavyweights like WildFly and JBoss EAP , has been hit by a critical…

Immagine del sitoCybercrime
Iran Protests Escalate as Reza Pahlavi Calls for Action Against Government
Redazione RHC - 09/01/2026

Iranian protesters chanted and marched through the streets until Friday morning, following a call from exiled former Prince Reza Pahlavi to demonstrate, despite the Iranian theocracy cutting off the country from the internet and international…

Immagine del sitoCybercrime
Veeam Backup Vulnerability: Critical RCE Flaw Discovered – Update Now
Redazione RHC - 08/01/2026

Backups are generally considered the last line of defense, but this week Veeam reminded us that backup systems themselves can become entry points for attacks. The company released security updates for Backup & Replication ,…