Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Fortinet 320x100px
Banner Desktop

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Fortinet FortiSIEM Vulnerability CVE-2025-64155: Critical Security Update Cybercrime

Fortinet FortiSIEM Vulnerability CVE-2025-64155: Critical Security Update

A critical security flaw was recently patched by Fortinet through update releases, which significantly impacted FortiSIEM . An unauthenticated attacker...
Redazione RHC - 15 January 2026
ARM: The Future of Low-Power Computing and AI Cybercrime

ARM: The Future of Low-Power Computing and AI

Just look around and you'll almost certainly find a device nearby that uses a processor based on the same design:...
Redazione RHC - 15 January 2026
24-Year-Old Hacker Breaches US Supreme Court Database Cybercrime

24-Year-Old Hacker Breaches US Supreme Court Database

Do you remember the 24-year-old hacker Carmelo Miano and the breaches of the Naples Prosecutor's Office's accounts and computer systems?...
Redazione RHC - 14 January 2026
Cyberattack Hits Belgian Hospital AZ Monica, Ransomware Used Cybercrime

Cyberattack Hits Belgian Hospital AZ Monica, Ransomware Used

In the early morning hours of January 13, one of Belgium's leading hospitals suddenly found itself nearly paralyzed. AZ Monica,...
Redazione RHC - 14 January 2026
Meta Shifts Focus from Metaverse to AI-Powered Wearables Cybercrime

Meta Shifts Focus from Metaverse to AI-Powered Wearables

Meta is launching a new internal reorganization process that directly involves Reality Labs, its virtual reality division, and the Metaverse....
Redazione RHC - 14 January 2026
Anthropic’s Claude AI Takes Control with Computer Use Feature Cybercrime

Anthropic’s Claude AI Takes Control with Computer Use Feature

Anthropic continues to push the evolution of AI-powered assistants, expanding Claude 's capabilities beyond simple text interaction. After establishing its...
Redazione RHC - 14 January 2026

EDRStartupHinder: Bypassing Windows EDR Security with BindLink

Sometimes, to disable Windows protection , you don't need to attack the antivirus directly. Simply preventing it from starting properly is sufficient. A researcher who goes by the name Two...
Share on Facebook Share on LinkedIn Share on X

Burnout in Cybersecurity: The Hidden Risk to Your Organization

In the world of cybersecurity, we often talk about attacks, vulnerabilities, and incidents. Less is said about a silent variable that runs through the entire sector: fatigue . Not end-of-day...
Share on Facebook Share on LinkedIn Share on X

APT28 Phishing Campaign: Credential Harvesting Tactics

The threat actor APT28 , classified as an Advanced Persistent Threat, active since at least 2004, identified by the alias BlueDelta, but even better known under the name IRON TWILIGHT...
Share on Facebook Share on LinkedIn Share on X

Iran Cyber Crisis: Connettività Compromised

Sometimes important things don't arrive at a press conference. They arrive like a graph that stops breathing: the connectivity line collapses, the OSINT dries up, the noise grows as the...
Share on Facebook Share on LinkedIn Share on X

ServiceNow AI Vulnerability CVE-2025-12420: Critical Security Risk

A critical flaw has been identified in ServiceNow's artificial intelligence platform, with a severity score of 9.3 out of 10. This vulnerability, classified as CVE-2025-12420, could allow attackers to impersonate...
Share on Facebook Share on LinkedIn Share on X

Microsoft Expands Global Network with New Undersea Fiber Optic Cables

In May 2015, Microsoft announced a series of strategic agreements to strengthen its global network infrastructure with new submarine fiber optic cables . This initiative is part of a broader...
Share on Facebook Share on LinkedIn Share on X

Poisoning AI Data: The New Threat to Machine Learning Models

A bold new initiative has been launched in the artificial intelligence industry to weaken machine learning models by deliberately distorting the data used to train them. The project, called Poison...
Share on Facebook Share on LinkedIn Share on X

Pig Butchering Scams Evolve with PBaaS: The New Threat

Online scams known as "pig butchering" are undergoing a profound transformation. From artisanal and disorganized operations , based on makeshift call centers, they have become a structured, scalable, and highly...
Share on Facebook Share on LinkedIn Share on X

Apache Struts 2 Vulnerability CVE-2025-68493 Exposes Sensitive Data

A new flaw has emerged in the foundation of one of the most popular Java frameworks on the web. Cybersecurity experts at ZAST.AI have discovered a significant security flaw in...
Share on Facebook Share on LinkedIn Share on X

CRISPR-Cas13: Breakthrough in Flu Treatment with Gene Editing

Influenza remains one of the most stubborn and unpleasant infections on the planet. It returns every winter, mutating, evading the immune system, and eventually becoming drug-resistant. Now, scientists are proposing...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Elon Musk Sues OpenAI for $134 Billion Over AI Betrayal
Redazione RHC - 19/01/2026

Elon Musk has filed a staggering $134 billion in damages in a malicious lawsuit against OpenAI and Microsoft. According to Bloomberg , the latest lawsuit accuses OpenAI of betraying its core mission as a nonprofit…

Immagine del sitoCulture
Net-NTLMv1 Exploitation: Rainbow Tables for Modern Attacks
Redazione RHC - 18/01/2026

Mandiant has released a large set of rainbow tables dedicated to Net-NTLMv1 with the aim of concretely demonstrating how insecure this authentication protocol has become. Although Net-NTLMv1 has been deprecated for years and its weaknesses…

Immagine del sitoCybercrime
Your paycheck is zero! Congratulations, someone answered the phone wrong
Redazione RHC - 18/01/2026

No worker would accept their paycheck disappearing without explanation. It was precisely from a series of internal reports of this nature that an organization began investigating an apparently administrative anomaly, discovering instead a targeted cyber…

Immagine del sitoCybercrime
Two Ukrainians Suspected in Black Basta Ransomware Attacks
Redazione RHC - 17/01/2026

When it comes to cybersecurity, it’s not uncommon to come across news stories that seem straight out of a science fiction movie. Yet, the reality is even more surprising and sometimes disturbing. The story of…

Immagine del sitoCybercrime
Gootloader Malware Returns with Enhanced Evasion Techniques
Redazione RHC - 17/01/2026

After a long period of silence, the Gootloader downloader malware has returned to the forefront. Last November, the Huntress team detected a new campaign signaling the return of a developer previously associated with the Vanilla…