Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
UtiliaCS 320x100
970x20 Itcentric

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Critical n8n Vulnerability: Update Now to Prevent RCE Attacks Vulnerability

Critical n8n Vulnerability: Update Now to Prevent RCE Attacks

n8n, the “fair-code” workflow automation platform beloved by engineering teams for its combination of low-code speed and programming flexibility, has...
Redazione RHC - 7 January 2026
Ledger Data Breach: Global-e Hack Exposes Customer Info Cybercrime

Ledger Data Breach: Global-e Hack Exposes Customer Info

Hackers have infiltrated Global-e's systems, and some Ledger customers are now at risk of receiving highly convincing scam emails. Ledger...
Redazione RHC - 7 January 2026
LED Data Transmission System for Smart Traffic innovation

LED Data Transmission System for Smart Traffic

Researchers at Tokyo Polytechnic University have presented a simple and cost-effective wireless data transmission system using LEDs. The project boasts...
Redazione RHC - 7 January 2026
Microsoft Shifts to Rust: AI-Driven Code Transformation by 2030 Cybercrime

Microsoft Shifts to Rust: AI-Driven Code Transformation by 2030

Microsoft has launched one of the most ambitious code transformation programs ever announced in the software industry: the stated goal...
Redazione RHC - 7 January 2026
Microsoft’s AI Future: Models to Systems with Satya Nadella Cybercrime

Microsoft’s AI Future: Models to Systems with Satya Nadella

With 2026 just around the corner, Microsoft CEO Satya Nadella shared a thoughtful reflection on the state of the AI...
Redazione RHC - 6 January 2026
Rare Earth Elements: US-China Competition Heats Up Cybercrime

Rare Earth Elements: US-China Competition Heats Up

An increasingly pressing question is emerging in the United States: after a long series of bans, restrictions, and closures against...
Redazione RHC - 6 January 2026

Windows 11 Performance Test: Surprising Results with Windows 8.1

A comparison test across six generations of Windows was conducted by YouTube channel TrigrZolt , which unexpectedly revealed a clear winner: Windows 8.1. Windows 11, on the other hand, performed...
Share on Facebook Share on LinkedIn Share on X

PentestAgent: Revolutionizing Penetration Testing with AI-Powered Tools

PentestAgent is another new open source project developed by the GH05TCREW group that aims to support penetration testing activities through the use of agents based on language models. The tool...
Share on Facebook Share on LinkedIn Share on X

US Treasury Removes Sanctions on Intellexa Spyware Developers

The U.S. Treasury Department unexpectedly removed from its sanctions list three individuals previously accused of ties to Intellexa , the developer of the Predator spyware . The decision was made...
Share on Facebook Share on LinkedIn Share on X

Rue Language: Revolutionizing System Programming with AI

Veteran software developer Steve Klabnik, who helped create Rust and Ruby on Rails, has started work on a new programming language called Rue . The name may seem ambiguous— it...
Share on Facebook Share on LinkedIn Share on X

Password Security: The Impact of Human Behavior on Password Strength

Password security and human behavior are more connected than we think. In previous episodes, we tried to shift our focus: passwords don't just protect systems, they tell stories about people....
Share on Facebook Share on LinkedIn Share on X

Potential Data Breach at Pickett USA Exposes Critical Energy Infrastructure

An unknown attacker claims to have hacked Pickett and Associates (Pickett USA), a Florida-based engineering firm, and is now selling a large amount of engineering data related to projects managed...
Share on Facebook Share on LinkedIn Share on X

Forensic Timeliner: Advanced Digital Forensics Tool for DFIR Analysis

Forensic Timeliner is a high-performance forensic processing engine designed to support DFIR (Digital Forensics and Incident Response ) analysts in artifact triage and correlation. The tool allows you to quickly...
Share on Facebook Share on LinkedIn Share on X

Google Unveils Nano Banana 2 Flash for Rapid Image Generation

Google is preparing to introduce a new generative AI model for image processing: the Nano Banana 2 Flash . It will be part of its Flash lineup , which focuses...
Share on Facebook Share on LinkedIn Share on X

Ancient Chinese Silk Loom: The World’s First Computer?

When you evaluate a computer not just by its outer casing and display, but fundamentally as a machine that accepts directions, performs actions automatically, and delivers results, a contender for...
Share on Facebook Share on LinkedIn Share on X

Neuralink’s Brain-Computer Implants to Revolutionize Human Life by 2026

Neuralink, Elon Musk's brain implant company, is preparing to realize what until recently seemed like science fiction. According to Musk, the company plans to launch "large-scale production" of brain-computer devices...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Undertow Vulnerability CVE-2025-12543 Exposes Java Ecosystem to Critical Security Risks
Redazione RHC - 09/01/2026

A flaw has been discovered in the foundation of the Java web ecosystem. Undertow , the high-performance web server that powers enterprise heavyweights like WildFly and JBoss EAP , has been hit by a critical…

Immagine del sitoCybercrime
Iran Protests Escalate as Reza Pahlavi Calls for Action Against Government
Redazione RHC - 09/01/2026

Iranian protesters chanted and marched through the streets until Friday morning, following a call from exiled former Prince Reza Pahlavi to demonstrate, despite the Iranian theocracy cutting off the country from the internet and international…

Immagine del sitoCybercrime
Veeam Backup Vulnerability: Critical RCE Flaw Discovered – Update Now
Redazione RHC - 08/01/2026

Backups are generally considered the last line of defense, but this week Veeam reminded us that backup systems themselves can become entry points for attacks. The company released security updates for Backup & Replication ,…

Immagine del sitoCybercrime
When Attack Discovery Becomes Automated, Detection Stops Scaling
Alexander Rogan - 08/01/2026

For much of the past two decades, cybersecurity has been built on a simple assumption: malicious activity can be detected, analysed, and responded to before meaningful damage occurs. This assumption shaped everything from SOC design…

Immagine del sitoCybercrime
CVE-2026-21858: n8n Vulnerability Exposes Thousands of Servers to RCE
Redazione RHC - 08/01/2026

The vulnerability, identified as CVE-2026-21858, which we recently reported on, affects approximately 100,000 servers worldwide, threatening to expose proprietary API keys, customer databases, and AI workflows. The vulnerability, with a CVSS score of 10, has…