Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320x100 Itcentric
HackTheBox 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

The AI Energy Crisis: How Data Centers Are Reshaping US Power Costs Cybercrime

The AI Energy Crisis: How Data Centers Are Reshaping US Power Costs

The accelerated growth of artificial intelligence is bringing with it an increasingly obvious consequence : rising energy demand. This issue...
Redazione RHC - 15 January 2026
Microsoft Copilot Vulnerability Exposes User Data to Hackers Cybercrime

Microsoft Copilot Vulnerability Exposes User Data to Hackers

A recently fixed vulnerability allowed attackers to exploit Microsoft Copilot Personal with a single click to steal sensitive user data....
Redazione RHC - 15 January 2026
Progress Software Patches LoadMaster, MOVEit WAF Vulnerabilities Cybercrime

Progress Software Patches LoadMaster, MOVEit WAF Vulnerabilities

On January 12, 2026, Progress Software Corporation released patches that address two high-severity Command Injection vulnerabilities, which could allow remote...
Redazione RHC - 15 January 2026
Fortinet FortiSIEM Vulnerability CVE-2025-64155: Critical Security Update Cybercrime

Fortinet FortiSIEM Vulnerability CVE-2025-64155: Critical Security Update

A critical security flaw was recently patched by Fortinet through update releases, which significantly impacted FortiSIEM . An unauthenticated attacker...
Redazione RHC - 15 January 2026
ARM: The Future of Low-Power Computing and AI Cybercrime

ARM: The Future of Low-Power Computing and AI

Just look around and you'll almost certainly find a device nearby that uses a processor based on the same design:...
Redazione RHC - 15 January 2026
24-Year-Old Hacker Breaches US Supreme Court Database Cybercrime

24-Year-Old Hacker Breaches US Supreme Court Database

Do you remember the 24-year-old hacker Carmelo Miano and the breaches of the Naples Prosecutor's Office's accounts and computer systems?...
Redazione RHC - 14 January 2026

The AI Energy Crisis: How Data Centers Are Reshaping US Power Costs

The accelerated growth of artificial intelligence is bringing with it an increasingly obvious consequence : rising energy demand. This issue entered the US political debate forcefully on January 13, when...
Share on Facebook Share on LinkedIn Share on X

Microsoft Copilot Vulnerability Exposes User Data to Hackers

A recently fixed vulnerability allowed attackers to exploit Microsoft Copilot Personal with a single click to steal sensitive user data. Using a phishing link, attackers were able to take control...
Share on Facebook Share on LinkedIn Share on X

Progress Software Patches LoadMaster, MOVEit WAF Vulnerabilities

On January 12, 2026, Progress Software Corporation released patches that address two high-severity Command Injection vulnerabilities, which could allow remote attackers to execute malicious code on LoadMaster load balancers and...
Share on Facebook Share on LinkedIn Share on X

Fortinet FortiSIEM Vulnerability CVE-2025-64155: Critical Security Update

A critical security flaw was recently patched by Fortinet through update releases, which significantly impacted FortiSIEM . An unauthenticated attacker could have exploited this weakness to execute arbitrary code on...
Share on Facebook Share on LinkedIn Share on X

ARM: The Future of Low-Power Computing and AI

Just look around and you'll almost certainly find a device nearby that uses a processor based on the same design: smartphones, smart speakers, TV remote controls, coffee machines, car components,...
Share on Facebook Share on LinkedIn Share on X

24-Year-Old Hacker Breaches US Supreme Court Database

Do you remember the 24-year-old hacker Carmelo Miano and the breaches of the Naples Prosecutor's Office's accounts and computer systems? It appears something similar happened in the United States, and...
Share on Facebook Share on LinkedIn Share on X

Cyberattack Hits Belgian Hospital AZ Monica, Ransomware Used

In the early morning hours of January 13, one of Belgium's leading hospitals suddenly found itself nearly paralyzed. AZ Monica, with locations in Antwerp and Deurne, was hit by a...
Share on Facebook Share on LinkedIn Share on X

Meta Shifts Focus from Metaverse to AI-Powered Wearables

Meta is launching a new internal reorganization process that directly involves Reality Labs, its virtual reality division, and the Metaverse. According to Bloomberg, the company has begun cutting over 1,000...
Share on Facebook Share on LinkedIn Share on X

Anthropic’s Claude AI Takes Control with Computer Use Feature

Anthropic continues to push the evolution of AI-powered assistants, expanding Claude 's capabilities beyond simple text interaction. After establishing its presence among developers and enterprises , the company has introduced...
Share on Facebook Share on LinkedIn Share on X

China Leads the Way with Level 3 Autonomous Vehicle License Plates

On December 23, the Traffic Management Bureau of the Beijing Municipal Public Security Bureau officially issued the first batch of Level 3 autonomous driving license plates to three connected intelligent...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Microsoft Copilot Vulnerability Exposes User Data to Hackers
Redazione RHC - 15/01/2026

A recently fixed vulnerability allowed attackers to exploit Microsoft Copilot Personal with a single click to steal sensitive user data. Using a phishing link, attackers were able to take control of sessions without requiring further…

Immagine del sitoCybercrime
Progress Software Patches LoadMaster, MOVEit WAF Vulnerabilities
Redazione RHC - 15/01/2026

On January 12, 2026, Progress Software Corporation released patches that address two high-severity Command Injection vulnerabilities, which could allow remote attackers to execute malicious code on LoadMaster load balancers and MOVEit Web Application Firewalls (WAFs).…

Immagine del sitoCybercrime
24-Year-Old Hacker Breaches US Supreme Court Database
Redazione RHC - 14/01/2026

Do you remember the 24-year-old hacker Carmelo Miano and the breaches of the Naples Prosecutor’s Office’s accounts and computer systems? It appears something similar happened in the United States, and the other young man is…

Immagine del sitoCybercrime
Cloudflare vs Italy: The Battle for Internet Freedom and DNS Control
Redazione RHC - 14/01/2026

Cloudflare CEO Matthew Prince has threatened to shut down the company’s operations in Italy after the country’s telecom regulator fined it twice its annual revenue in the country. The facts The conflict erupted around Italy’s…

Immagine del sitoCybercrime
Cybercrime Meets Real-Life Violence: Foxtrot Network’s Dark Side
Redazione RHC - 13/01/2026

In recent months, there has been increasing talk of a paradigm shift in cybercrime . What for years was perceived as a predominantly digital ecosystem— consisting of fraud, identity theft, online extortion, and cyberattacks —is…