Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320x100 Itcentric
Fortinet 970x120px

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Iran Protests Escalate as Reza Pahlavi Calls for Action Against Government Cybercrime

Iran Protests Escalate as Reza Pahlavi Calls for Action Against Government

Iranian protesters chanted and marched through the streets until Friday morning, following a call from exiled former Prince Reza Pahlavi...
Redazione RHC - 9 January 2026
Taiwan Citizens Accused in China of Smuggling and Cable Sabotage Cybercrime

Taiwan Citizens Accused in China of Smuggling and Cable Sabotage

Chinese authorities have formally charged two Taiwanese citizens with involvement in a smuggling operation linked to an incident in February...
Redazione RHC - 9 January 2026
QR Code Phishing via HTML: New Attack Vector Emerges Cybercrime

QR Code Phishing via HTML: New Attack Vector Emerges

We know that criminal hackers always manage to surprise us, and this time too they surprise us with the innovation...
Redazione RHC - 8 January 2026
Veeam Backup Vulnerability: Critical RCE Flaw Discovered – Update Now Cybercrime

Veeam Backup Vulnerability: Critical RCE Flaw Discovered – Update Now

Backups are generally considered the last line of defense, but this week Veeam reminded us that backup systems themselves can...
Redazione RHC - 8 January 2026
GoBruteforcer Botnet Exploits AI-Generated Server Configs, Targets Crypto Cybercrime

GoBruteforcer Botnet Exploits AI-Generated Server Configs, Targets Crypto

The GoBruteforcer botnet has been discovered to be exploiting a surprisingly current weakness: the widespread reuse of AI-generated server configurations....
Redazione RHC - 8 January 2026
When Attack Discovery Becomes Automated, Detection Stops Scaling Cybercrime

When Attack Discovery Becomes Automated, Detection Stops Scaling

For much of the past two decades, cybersecurity has been built on a simple assumption: malicious activity can be detected,...
Alexander Rogan - 8 January 2026

Rue Language: Revolutionizing System Programming with AI

Veteran software developer Steve Klabnik, who helped create Rust and Ruby on Rails, has started work on a new programming language called Rue . The name may seem ambiguous— it...
Share on Facebook Share on LinkedIn Share on X

Password Security: The Impact of Human Behavior on Password Strength

Password security and human behavior are more connected than we think. In previous episodes, we tried to shift our focus: passwords don't just protect systems, they tell stories about people....
Share on Facebook Share on LinkedIn Share on X

Potential Data Breach at Pickett USA Exposes Critical Energy Infrastructure

An unknown attacker claims to have hacked Pickett and Associates (Pickett USA), a Florida-based engineering firm, and is now selling a large amount of engineering data related to projects managed...
Share on Facebook Share on LinkedIn Share on X

Forensic Timeliner: Advanced Digital Forensics Tool for DFIR Analysis

Forensic Timeliner is a high-performance forensic processing engine designed to support DFIR (Digital Forensics and Incident Response ) analysts in artifact triage and correlation. The tool allows you to quickly...
Share on Facebook Share on LinkedIn Share on X

Google Unveils Nano Banana 2 Flash for Rapid Image Generation

Google is preparing to introduce a new generative AI model for image processing: the Nano Banana 2 Flash . It will be part of its Flash lineup , which focuses...
Share on Facebook Share on LinkedIn Share on X

Ancient Chinese Silk Loom: The World’s First Computer?

When you evaluate a computer not just by its outer casing and display, but fundamentally as a machine that accepts directions, performs actions automatically, and delivers results, a contender for...
Share on Facebook Share on LinkedIn Share on X

Neuralink’s Brain-Computer Implants to Revolutionize Human Life by 2026

Neuralink, Elon Musk's brain implant company, is preparing to realize what until recently seemed like science fiction. According to Musk, the company plans to launch "large-scale production" of brain-computer devices...
Share on Facebook Share on LinkedIn Share on X

Zero-Day Exploits on the Rise: How to Protect Your Network

Until recently, zero-day vulnerabilities seemed like exotic artifacts from the world of special operations and espionage . Now they're a common tool for hacking corporate networks, and not just because...
Share on Facebook Share on LinkedIn Share on X

Long-Lived Technologies: COBOL, C, SQL, and Legacy Systems

While the industry debates which neural network is the “smartest” and which framework is the “most modern,” decades-old technologies continue to quietly swirl beneath the surface of the banking industry...
Share on Facebook Share on LinkedIn Share on X

PollyPolymer Revolutionizes Robotics with 3D Printed Flexible Components

When XPeng unveiled its new humanoid robot this year, the spectacle was designed to inspire disbelief. The robot's movements were so lifelike that company founder He Xiaopeng had to cut...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
VoidLink Malware: Advanced Linux Framework Targets Cloud Infrastructures
Redazione RHC - 16/01/2026

Check Point researchers have discovered a new Linux infection framework distinguished by its advanced modular architecture and wide range of features. The malware has been dubbed VoidLink . The framework is composed of over 30…

Immagine del sitoCybercrime
Microsoft Copilot Vulnerability Exposes User Data to Hackers
Redazione RHC - 15/01/2026

A recently fixed vulnerability allowed attackers to exploit Microsoft Copilot Personal with a single click to steal sensitive user data. Using a phishing link, attackers were able to take control of sessions without requiring further…

Immagine del sitoCybercrime
Progress Software Patches LoadMaster, MOVEit WAF Vulnerabilities
Redazione RHC - 15/01/2026

On January 12, 2026, Progress Software Corporation released patches that address two high-severity Command Injection vulnerabilities, which could allow remote attackers to execute malicious code on LoadMaster load balancers and MOVEit Web Application Firewalls (WAFs).…

Immagine del sitoCybercrime
24-Year-Old Hacker Breaches US Supreme Court Database
Redazione RHC - 14/01/2026

Do you remember the 24-year-old hacker Carmelo Miano and the breaches of the Naples Prosecutor’s Office’s accounts and computer systems? It appears something similar happened in the United States, and the other young man is…

Immagine del sitoCybercrime
Cloudflare vs Italy: The Battle for Internet Freedom and DNS Control
Redazione RHC - 14/01/2026

Cloudflare CEO Matthew Prince has threatened to shut down the company’s operations in Italy after the country’s telecom regulator fined it twice its annual revenue in the country. The facts The conflict erupted around Italy’s…