Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Crowdstriker 970×120
Precedente Successivo

Latest news

The Thin Red Line of Criminal Liability in Cybersecurity Culture
China Bans Western Cybersecurity Software, Cites Security Fears Cyber News
OpenAI API Logs Vulnerability Exposed: Data Exfiltration Risk Cyber News
Zoom Security Alert: Critical Vulnerability in Node MMR Devices Cyber News
LockBit 5.0 Ransomware: New Threats and Advanced Tactics Cybercrime
Cybersecurity in Local Administrations: The Hidden Risk Cybercrime

Cybersecurity in Local Administrations: The Hidden Risk

Roberto Villani - January 22, 2026
UK Organizations Hit by Russia-Backed DDoS Attacks Cyber News

UK Organizations Hit by Russia-Backed DDoS Attacks

Redazione RHC - January 22, 2026
GitLab Security Update Fixes Critical Vulnerabilities CVE-2026-0723 Cyber News
Critical Telnetd Vulnerability in GNU InetUtils Allows Root Access Cyber News

A blow to the heart of cybercrime: RAMP taken offline. The “temple” of ransomware falls!

The RAMP (Russian Anonymous Marketplace) forum, one of the main hubs of the international cybercrime underground, has been officially shut down and seized by US law enforcement . The news...

Is privacy dead? No, but it’s in a coma! What are we really celebrating today, January 28th?

Today is January 28th, and like every year for quite some time now, we find ourselves celebrating European Data Protection Day. It's something that started around 2006, to commemorate the...

n8n Alert: Two critical RCE vulnerabilities discovered (CVE-2026-1470). Update now!

The n8n platform, a widely adopted open source software for orchestrating enterprise automation and workflows, was recently at the center of a new security alert: two vulnerabilities emerged in its...

Telnet, the return of a ghost. A 2015 bug exploited in 2026: 800,000 devices at risk.

GNU InetUtils is a collection of network utilities (including telnet/telnetd, ftp/ftpd, rsh/rshd, ping, and traceroute) used by several Linux distributions. These tools can operate for extended periods without the need...

OpenSSL: 12 security bugs found, including a critical vulnerability

A security update has been released by maintainers of OpenSSL, the cryptographic library, addressing about a dozen vulnerabilities, including logic errors and memory corruption, among others. The most alarming discovery...

Digital Autonomy: France Says Goodbye to Teams and Zoom by 2027

This isn't the first initiative to emerge on this front recently. Indeed, we've heard several of them, one after the other. And it's almost inevitable: technological autonomy and national security...

Fortinet Vulnerability CVE-2026-24858: Hackers Inside Networks with Legitimate Credentials

A serious flaw, classified as CVE-2026-24858, has been confirmed to be exploited in real-world attacks against vulnerable devices. This isn't a theoretical warning or an isolated problem: attackers have already...

NSA publishes first operational guidelines on Zero Trust

The U.S. National Security Agency (NSA) has released the first two documents in its Zero Trust Implementation Guidelines (ZIGs) series, aimed at providing practical and operational guidance to support organizations...

Ransomware doesn’t lock servers, it locks credit. The financial side of cybersecurity

There's this mistaken—somewhat romantic, if you will—idea that ransomware is "IT stuff": a few servers in trouble, a couple of sleepless nights, then you restart and it's over… The reality,...

AI Isn’t as Reliable as You Think: The Hidden Risks of LLMs Without Good Governance

Adopting large language models (LLMs) without adequate governance, verification, and oversight risks legal, financial, and reputational damage. This data emerges from the report "Risks of Unmanaged AI Reliance: Evaluating Regional...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE