Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Cyber Offensive Fundamentals 970x120 V0.1

Latest news

Your MFA is no longer enough: Phishing kits bypass multi-factor authentication Cyber News

Your MFA is no longer enough: Phishing kits bypass multi-factor authentication

The amount of PhaaS kit has doubled since last year, according to an analysis by Barracuda Networks, placing increased pressure...
Redazione RHC - January 23, 2026
He arrived in America with $200 and ended up in a reformatory: today he controls 90% of the world’s AI innovation

He arrived in America with $200 and ended up in a reformatory: today he controls 90% of the world’s AI

How three insiders with just $200 in their pockets reached a market capitalization of $5 trillion and created the company...
Carlo Denza - January 23, 2026
The Thin Red Line of Criminal Liability in Cybersecurity Culture

The Thin Red Line of Criminal Liability in Cybersecurity

This article is the first in a series of three articles exploring the delicate relationship between cybersecurity professionals and the...
Paolo Galdieri - January 23, 2026
China Bans Western Cybersecurity Software, Cites Security Fears Cyber News

China Bans Western Cybersecurity Software, Cites Security Fears

Chinese authorities have begun quietly eliminating Western solutions from corporate networks in the country. According to Reuters sources, Chinese companies...
Agostino Pellegrino - January 22, 2026
Vulnerabilities discovered in Foxit PDF Editor, Epic Games Store, and MedDream PACS Cyber News

Vulnerabilities discovered in Foxit PDF Editor, Epic Games Store, and MedDream PACS

Recently, the Cisco Talos vulnerability research and discovery team identified a number of vulnerabilities in various software. Specifically, three vulnerabilities...
Massimiliano Brolli - January 22, 2026
OpenAI API Logs Vulnerability Exposed: Data Exfiltration Risk Cyber News

OpenAI API Logs Vulnerability Exposed: Data Exfiltration Risk

Imagine your chatbot worked properly and didn't display a malicious response to the user. But a leak still occurred later,...
Redazione RHC - January 22, 2026
Zoom Security Alert: Critical Vulnerability in Node MMR Devices Cyber News

Zoom Security Alert: Critical Vulnerability in Node MMR Devices

Zoom Video Communications has issued an urgent security advisory for a critical vulnerability (identified as CVE-2026-22844 ) affecting its enterprise...
Silvia Felici - January 22, 2026
LockBit 5.0 Ransomware: New Threats and Advanced Tactics Cybercrime

LockBit 5.0 Ransomware: New Threats and Advanced Tactics

The LockBit group, which many had quickly dismissed after high-profile failures and leaks, unexpectedly returned to the scene. In the...
Pietro Melillo - January 22, 2026
Cybersecurity in Local Administrations: The Hidden Risk Cybercrime

Cybersecurity in Local Administrations: The Hidden Risk

There's a convenient misconception in Italy: thinking that cybersecurity is a matter for ministries or large strategic players. It's reassuring....
Roberto Villani - January 22, 2026
UK Organizations Hit by Russia-Backed DDoS Attacks Cyber News

UK Organizations Hit by Russia-Backed DDoS Attacks

The UK's National Cyber Security Centre has issued a strong warning regarding a series of denial-of-service (DDoS) attacks targeting British...
Redazione RHC - January 22, 2026
GitLab Security Update Fixes Critical Vulnerabilities CVE-2026-0723 Cyber News

GitLab Security Update Fixes Critical Vulnerabilities CVE-2026-0723

An urgent security update has been released by GitLab for the Community (CE) and Enterprise (EE) editions to address several...
Massimiliano Brolli - January 21, 2026
Critical Telnetd Vulnerability in GNU InetUtils Allows Root Access Cyber News

Critical Telnetd Vulnerability in GNU InetUtils Allows Root Access

A critical security flaw has been discovered in the telnetd server component of GNU InetUtils, involving remote authentication bypass ....
Agostino Pellegrino - January 21, 2026

WinRAR as a Weapon: Google Discovers a Vulnerability Exploited by APTs and Cybercriminals

The WinRAR security flaw, which emerged last summer, has become more widespread than expected. Several organizations, both common criminals and nationally funded APT groups, are actively exploiting this vulnerability, as...

Latin America under digital siege: the numbers that worry experts

In recent months, Latin America and the Caribbean have become the most targeted region by cyberattacks globally, surpassing Africa in terms of overall risk. This data emerges from the latest...

A blow to the heart of cybercrime: RAMP taken offline. The “temple” of ransomware falls!

The RAMP (Russian Anonymous Marketplace) forum, one of the main hubs of the international cybercrime underground, has been officially shut down and seized by US law enforcement . The news...

Is privacy dead? No, but it’s in a coma! What are we really celebrating today, January 28th?

Today is January 28th, and like every year for quite some time now, we find ourselves celebrating European Data Protection Day. It's something that started around 2006, to commemorate the...

n8n Alert: Two critical RCE vulnerabilities discovered (CVE-2026-1470). Update now!

The n8n platform, a widely adopted open source software for orchestrating enterprise automation and workflows, was recently at the center of a new security alert: two vulnerabilities emerged in its...

Telnet, the return of a ghost. A 2015 bug exploited in 2026: 800,000 devices at risk.

GNU InetUtils is a collection of network utilities (including telnet/telnetd, ftp/ftpd, rsh/rshd, ping, and traceroute) used by several Linux distributions. These tools can operate for extended periods without the need...

OpenSSL: 12 security bugs found, including a critical vulnerability

A security update has been released by maintainers of OpenSSL, the cryptographic library, addressing about a dozen vulnerabilities, including logic errors and memory corruption, among others. The most alarming discovery...

Digital Autonomy: France Says Goodbye to Teams and Zoom by 2027

This isn't the first initiative to emerge on this front recently. Indeed, we've heard several of them, one after the other. And it's almost inevitable: technological autonomy and national security...

Fortinet Vulnerability CVE-2026-24858: Hackers Inside Networks with Legitimate Credentials

A serious flaw, classified as CVE-2026-24858, has been confirmed to be exploited in real-world attacks against vulnerable devices. This isn't a theoretical warning or an isolated problem: attackers have already...

NSA publishes first operational guidelines on Zero Trust

The U.S. National Security Agency (NSA) has released the first two documents in its Zero Trust Implementation Guidelines (ZIGs) series, aimed at providing practical and operational guidance to support organizations...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE