Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Crowdstrike 320×100
Redhotcyber Banner Sito 970x120px Uscita 101125

Red Hot Cyber. The Cybersecurity Blog

Precedente Successivo

Ultime news

Telnet, the return of a ghost. A 2015 bug exploited in 2026: 800,000 devices at risk. Cyber News

Telnet, the return of a ghost. A 2015 bug exploited in 2026: 800,000 devices at risk.

GNU InetUtils is a collection of network utilities (including telnet/telnetd, ftp/ftpd, rsh/rshd, ping, and traceroute) used by several Linux distributions....
Pietro Melillo - 28 January 2026
OpenSSL: 12 security bugs found, including a critical vulnerability Cyber News

OpenSSL: 12 security bugs found, including a critical vulnerability

A security update has been released by maintainers of OpenSSL, the cryptographic library, addressing about a dozen vulnerabilities, including logic...
Bajram Zeqiri - 28 January 2026
Digital Autonomy: France Says Goodbye to Teams and Zoom by 2027 Cyberpolitics

Digital Autonomy: France Says Goodbye to Teams and Zoom by 2027

This isn't the first initiative to emerge on this front recently. Indeed, we've heard several of them, one after the...
Silvia Felici - 28 January 2026
Fortinet Vulnerability CVE-2026-24858: Hackers Inside Networks with Legitimate Credentials Cyber News

Fortinet Vulnerability CVE-2026-24858: Hackers Inside Networks with Legitimate Credentials

A serious flaw, classified as CVE-2026-24858, has been confirmed to be exploited in real-world attacks against vulnerable devices. This isn't...
Bajram Zeqiri - 28 January 2026
NSA publishes first operational guidelines on Zero Trust Cyberpolitics

NSA publishes first operational guidelines on Zero Trust

The U.S. National Security Agency (NSA) has released the first two documents in its Zero Trust Implementation Guidelines (ZIGs) series,...
Silvia Felici - 28 January 2026
Beware of WhatsApp groups: An image can compromise your smartphone. Cyber News

Beware of WhatsApp groups: An image can compromise your smartphone.

WhatsApp is going through a very turbulent period. While many users still consider Meta's app a standard for mass messaging...
Redazione RHC - 27 January 2026

Telnet, the return of a ghost. A 2015 bug exploited in 2026: 800,000 devices at risk.

GNU InetUtils is a collection of network utilities (including telnet/telnetd, ftp/ftpd, rsh/rshd, ping, and traceroute) used by several Linux distributions. These tools can operate for extended periods without the need...

OpenSSL: 12 security bugs found, including a critical vulnerability

A security update has been released by maintainers of OpenSSL, the cryptographic library, addressing about a dozen vulnerabilities, including logic errors and memory corruption, among others. The most alarming discovery...

Digital Autonomy: France Says Goodbye to Teams and Zoom by 2027

This isn't the first initiative to emerge on this front recently. Indeed, we've heard several of them, one after the other. And it's almost inevitable: technological autonomy and national security...

Fortinet Vulnerability CVE-2026-24858: Hackers Inside Networks with Legitimate Credentials

A serious flaw, classified as CVE-2026-24858, has been confirmed to be exploited in real-world attacks against vulnerable devices. This isn't a theoretical warning or an isolated problem: attackers have already...

NSA publishes first operational guidelines on Zero Trust

The U.S. National Security Agency (NSA) has released the first two documents in its Zero Trust Implementation Guidelines (ZIGs) series, aimed at providing practical and operational guidance to support organizations...

Beware of WhatsApp groups: An image can compromise your smartphone.

WhatsApp is going through a very turbulent period. While many users still consider Meta's app a standard for mass messaging , the general sentiment is shifting toward forced necessity rather...

Linux: A “ghost” kernel bug discovered that had been lurking since 2020!

A significant vulnerability has been discovered in the Linux kernel, hidden for years in one of the most critical architectural components of the system : the x86 page fault handling...

Ransomware doesn’t lock servers, it locks credit. The financial side of cybersecurity

There's this mistaken—somewhat romantic, if you will—idea that ransomware is "IT stuff": a few servers in trouble, a couple of sleepless nights, then you restart and it's over… The reality,...

AI Isn’t as Reliable as You Think: The Hidden Risks of LLMs Without Good Governance

Adopting large language models (LLMs) without adequate governance, verification, and oversight risks legal, financial, and reputational damage. This data emerges from the report "Risks of Unmanaged AI Reliance: Evaluating Regional...

Active Defense and Hackback: The Legal Labyrinth of Cybersecurity

In our previous article, we explored how the cybersecurity professional's role as guarantor clashes with classic scenarios such as unauthorized access. However, in my professional and academic experience, I often...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCyberpolitics
Digital Autonomy: France Says Goodbye to Teams and Zoom by 2027
Silvia Felici - 28/01/2026

This isn’t the first initiative to emerge on this front recently. Indeed, we’ve heard several of them, one after the other. And it’s almost inevitable: technological autonomy and national security are becoming an increasingly popular…

Immagine del sitoCyber News
And let the phishing begin! Microsoft is taking action against a zero-day exploit already exploited in Office
Pietro Melillo - 27/01/2026

Once again, Microsoft was forced to quickly fix some flaws. The company has released unscheduled patches for Microsoft Office, addressing a dangerous zero-day vulnerability that has already been exploited in cyberattacks. The issue, identified as…

Immagine del sitoCyber News
ServiceNow Under Attack: How an Email Can Open the Doors to Your Business
Redazione RHC - 27/01/2026

The recent discovery of a vulnerability in ServiceNow’s AI platform has shaken the cybersecurity industry. This flaw, characterized by an extremely high severity score, allowed unauthenticated attackers to impersonate any corporate user. To launch the…

Immagine del sitoCybercrime
149 Million Accounts Exposed: The Database No One Should Have Seen
Redazione RHC - 26/01/2026

A recent leak revealed 149 million logins and passwords exposed online , including accounts for financial services, social media, gaming, and dating sites. The discovery was made by researcher Jeremiah Fowler and shared with ExpressVPN.…

Immagine del sitoCybercrime
When Malware Hides in Videos! The PixelCode Technique Breaks the Rules
Marcello Filacchioni - 26/01/2026

PixelCode began as a research project exploring a hidden technique for storing binary data within images or videos . Instead of leaving a plaintext executable, the file is converted into pixel data, transforming each byte…