Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Latest news

OpenSSL: 12 security bugs found, including a critical vulnerability Cyber News

OpenSSL: 12 security bugs found, including a critical vulnerability

A security update has been released by maintainers of OpenSSL, the cryptographic library, addressing about a dozen vulnerabilities, including logic...
Bajram Zeqiri - January 28, 2026
Fortinet Vulnerability CVE-2026-24858: Hackers Inside Networks with Legitimate Credentials Cyber News

Fortinet Vulnerability CVE-2026-24858: Hackers Inside Networks with Legitimate Credentials

A serious flaw, classified as CVE-2026-24858, has been confirmed to be exploited in real-world attacks against vulnerable devices. This isn't...
Bajram Zeqiri - January 28, 2026
NSA publishes first operational guidelines on Zero Trust Cyberpolitics

NSA publishes first operational guidelines on Zero Trust

The U.S. National Security Agency (NSA) has released the first two documents in its Zero Trust Implementation Guidelines (ZIGs) series,...
Silvia Felici - January 28, 2026
Ransomware doesn’t lock servers, it locks credit. The financial side of cybersecurity Culture

Ransomware doesn’t lock servers, it locks credit. The financial side of cybersecurity

There's this mistaken—somewhat romantic, if you will—idea that ransomware is "IT stuff": a few servers in trouble, a couple of...
Antonio Piovesan - January 27, 2026
AI Isn’t as Reliable as You Think: The Hidden Risks of LLMs Without Good Governance innovation

AI Isn’t as Reliable as You Think: The Hidden Risks of LLMs Without Good Governance

Adopting large language models (LLMs) without adequate governance, verification, and oversight risks legal, financial, and reputational damage. This data emerges...
Silvia Felici - January 27, 2026
Active Defense and Hackback: The Legal Labyrinth of Cybersecurity Culture

Active Defense and Hackback: The Legal Labyrinth of Cybersecurity

In our previous article, we explored how the cybersecurity professional's role as guarantor clashes with classic scenarios such as unauthorized...
Paolo Galdieri - January 27, 2026
33,000 tons of iron… and an investigation where AIS and logs are cyber intelligence traps Cyberpolitics

33,000 tons of iron… and an investigation where AIS and logs are cyber intelligence traps

A recent operation in the port of Brindisi, conducted by the Guardia di Finanza in collaboration with the Customs and...
Roberto Villani - January 27, 2026
Email Security Under Pressure: Phishing Kits to Double in 2025 Cyber News

Email Security Under Pressure: Phishing Kits to Double in 2025

According to Barracuda’s Phishing Report 2025 , the number of phishing-as-a-service (PhaaS) kits is expected to double by 2025, placing...
Redazione RHC - January 26, 2026
Microsoft Teams will know where you are: your geographic location will be inferred from your Wi-Fi Cyber News

Microsoft Teams will know where you are: your geographic location will be inferred from your Wi-Fi

Microsoft is preparing to introduce an update that will transform a small manual habit into a system-wide automation. Soon, Microsoft...
Redazione RHC - January 26, 2026
Linux 7.0 says goodbye to the HIPPI relic: a piece of supercomputing history has been eliminated. Cyber News

Linux 7.0 says goodbye to the HIPPI relic: a piece of supercomputing history has been eliminated.

The Linux kernel has long been a well-established reality, and while it still contains code for technologies no longer in...
Silvia Felici - January 25, 2026
A working browser built with AI using 3 million lines of code: breakthrough or illusion? Cyber News

A working browser built with AI using 3 million lines of code: breakthrough or illusion?

A week ago, Cursor CEO Michael Truell announced a supposedly remarkable achievement. He claimed that, using GPT-5.2, Cursor had created...
Redazione RHC - January 24, 2026
Kimwolf: The IoT botnet that moves silently across corporate and government networks Cyber News

Kimwolf: The IoT botnet that moves silently across corporate and government networks

The Kimwolf botnet represents one of the most insidious IoT threats to emerge recently. According to the latest analyses, this...
Sandro Sana - January 24, 2026

Goodbye to NTLM! Microsoft is moving towards a new era of authentication with Kerberos

For over three decades, it has been a silent pillar of the Windows ecosystem. Now, however, NTLM 's time seems definitively over. Microsoft has decided to initiate a profound transition...

SCADA Systems at Risk: Why File System Security Matters More Than Ever

SCADA system security requires rigorous management of processes operating with elevated privileges. A recent technical analysis has examined the CVE-2025-0921 vulnerability in the ICONICS Suite, a supervisory system used in...

Critical vulnerability in Apache bRPC: Arbitrary command execution on the server

A CyberArk Labs research team has identified a critical flaw in the widely used Apache bRPC framework, which allows remote command execution on a server. The security issue has been...

The world’s first humanoid robot store has opened in China. Will we be ready?

At ten o'clock in the morning, in Wuhan, two 1.3-meter-tall humanoid robots begin moving with precision. They turn, jump, and follow a rhythm. It's the opening signal for the country's...

Ivanti Takes Action: Zero-Day Flaws Affect Mobile Endpoint Manager

Ivanti has released a series of critical updates to address two security vulnerabilities affecting Ivanti Endpoint Manager Mobile (EPMM). These vulnerabilities are being actively exploited in zero-day attacks, prompting the...

Johnson Controls Score 10 Vulnerabilities: Smart Buildings Are at Risk

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a maximum severity alert regarding a security flaw affecting Johnson Controls, a global leader in smart building technology. This vulnerability, classified...

Douglas Engelbart was born today: the man who saw and invented the digital future.

Sometimes, when you think about it, you wonder how we take the world around us for granted. Like, we click, scroll, type, and it all seems so natural, as if...

WhatsApp gets a makeover: “Paranoia” mode arrives (and no, it’s not for everyone).

WhatsApp has decided to toughen up. Not for everyone, not always, but when needed. The decision comes against a backdrop of a now-familiar climate: increasing cyber attacks, espionage that no...

BitLocker Under Fire: Microsoft Admits Handing Over Encryption Keys to FBI

Digital security today faces a troubling crossroads that affects millions of Windows users worldwide. Microsoft BitLocker, the popular proprietary encryption mechanism, allows you to protect data on hard drives, but...

Smartphones rented without your knowledge: Google dismantles a global proxy network

Android has never been so exploited, at least according to the latest developments reported by a recent investigation. Google announced that it has dismantled what may be the largest network...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE