Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Cyber Offensive Fundamentals 970x120 V0.1
Precedente Successivo

Latest news

Kimwolf: The IoT botnet that moves silently across corporate and government networks Cyber News

Kimwolf: The IoT botnet that moves silently across corporate and government networks

The Kimwolf botnet represents one of the most insidious IoT threats to emerge recently. According to the latest analyses, this...
Sandro Sana - January 24, 2026
NoName057(16) hits Italy 487 times in the last 3 months: the DDoS wave does not stop Cyber News

NoName057(16) hits Italy 487 times in the last 3 months: the DDoS wave does not stop

Italy has confirmed itself as one of the main targets of the DDoS attack campaign carried out by the hacktivist...
Marcello Filacchioni - January 24, 2026
Undersea Cables: Ignored Warnings and Uncertain Trials. The Truth About Underwater Accidents Cyber News

Undersea Cables: Ignored Warnings and Uncertain Trials. The Truth About Underwater Accidents

In recent years, Taiwan has seen a series of incidents in which its undersea cables have been damaged or destroyed,...
Sandro Sana - January 24, 2026
CISA Updates Vulnerability Catalog: New Cybersecurity Threats Cyber News

CISA Updates Vulnerability Catalog: New Cybersecurity Threats

The Cybersecurity and Infrastructure Security Agency (CISA) has updated its catalog of known exploited vulnerabilities (KEVs) with four new entries...
Agostino Pellegrino - January 24, 2026
NexPhone: Three operating systems in your pocket! The phone that challenges the very concept of a PC. Cyber News

NexPhone: Three operating systems in your pocket! The phone that challenges the very concept of a PC.

The question has been circulating for over ten years: can a smartphone really replace a computer? Over time, the industry...
Redazione RHC - January 23, 2026
BlueNoroff: The Hacker Group Revolutionizing Cybercrime Cyber News

BlueNoroff: The Hacker Group Revolutionizing Cybercrime

The BlueNoroff hacker group has long since transformed cybercrime into a high-tech business, with tens of millions of dollars, cryptocurrency...
Marcello Filacchioni - January 23, 2026

Your paycheck is zero! Congratulations, someone answered the phone wrong

No worker would accept their paycheck disappearing without explanation. It was precisely from a series of internal reports of this nature that an organization began investigating an apparently administrative anomaly,...

French Police Cyberattack Exposed: Weak Passwords Led to Data Breach

During a hearing in the French Senate, Interior Minister Laurent Nuñez detailed the details of the cyberattack that hit his ministry, immediately clarifying that some of the information remains covered...

Microsoft Patches Zero-Day NTFS Vulnerabilities in Windows 11 and Server

Microsoft released a security update in January that addresses two serious zero-day vulnerabilities in the NTFS file system. The vulnerabilities affected more than thirty versions of desktop and server operating...

AVCheck Malware Service Shut Down: Dutch Man Arrested for Cybercrime

Law enforcement has announced the arrest of a 33-year-old Dutch citizen on suspicion of operating the AVCheck platform, an online anti-malware testing service that was shut down last May during...

VoidLink Malware: Advanced Linux Framework Targets Cloud Infrastructures

Check Point researchers have discovered a new Linux infection framework distinguished by its advanced modular architecture and wide range of features. The malware has been dubbed VoidLink . The framework...

Microsoft Ends Support for Windows Server 2008: What It Means

This week marked the end of an era: Microsoft finally ended support for Windows Server 2008 , the operating system based on Windows Vista. The server operating system, codenamed Longhorn...

The AI Energy Crisis: How Data Centers Are Reshaping US Power Costs

The accelerated growth of artificial intelligence is bringing with it an increasingly obvious consequence : rising energy demand. This issue entered the US political debate forcefully on January 13, when...

Microsoft Copilot Vulnerability Exposes User Data to Hackers

A recently fixed vulnerability allowed attackers to exploit Microsoft Copilot Personal with a single click to steal sensitive user data. Using a phishing link, attackers were able to take control...

Progress Software Patches LoadMaster, MOVEit WAF Vulnerabilities

On January 12, 2026, Progress Software Corporation released patches that address two high-severity Command Injection vulnerabilities, which could allow remote attackers to execute malicious code on LoadMaster load balancers and...

ARM: The Future of Low-Power Computing and AI

Just look around and you'll almost certainly find a device nearby that uses a processor based on the same design: smartphones, smart speakers, TV remote controls, coffee machines, car components,...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE