Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

LECS 970x120 1
Precedente Successivo

Latest news

A blow to the heart of cybercrime: RAMP taken offline. The “temple” of ransomware falls! Cybercrime

A blow to the heart of cybercrime: RAMP taken offline. The “temple” of ransomware falls!

The RAMP (Russian Anonymous Marketplace) forum, one of the main hubs of the international cybercrime underground, has been officially shut...
Bajram Zeqiri - January 28, 2026
Is privacy dead? No, but it’s in a coma! What are we really celebrating today, January 28th? Culture

Is privacy dead? No, but it’s in a coma! What are we really celebrating today, January 28th?

Today is January 28th, and like every year for quite some time now, we find ourselves celebrating European Data Protection...
Silvia Felici - January 28, 2026
n8n Alert: Two critical RCE vulnerabilities discovered (CVE-2026-1470). Update now! Cyber News

n8n Alert: Two critical RCE vulnerabilities discovered (CVE-2026-1470). Update now!

The n8n platform, a widely adopted open source software for orchestrating enterprise automation and workflows, was recently at the center...
Redazione RHC - January 28, 2026
Telnet, the return of a ghost. A 2015 bug exploited in 2026: 800,000 devices at risk. Cyber News

Telnet, the return of a ghost. A 2015 bug exploited in 2026: 800,000 devices at risk.

GNU InetUtils is a collection of network utilities (including telnet/telnetd, ftp/ftpd, rsh/rshd, ping, and traceroute) used by several Linux distributions....
Pietro Melillo - January 28, 2026
OpenSSL: 12 security bugs found, including a critical vulnerability Cyber News

OpenSSL: 12 security bugs found, including a critical vulnerability

A security update has been released by maintainers of OpenSSL, the cryptographic library, addressing about a dozen vulnerabilities, including logic...
Bajram Zeqiri - January 28, 2026
Digital Autonomy: France Says Goodbye to Teams and Zoom by 2027 Cyberpolitics

Digital Autonomy: France Says Goodbye to Teams and Zoom by 2027

This isn't the first initiative to emerge on this front recently. Indeed, we've heard several of them, one after the...
Silvia Felici - January 28, 2026

Active Defense and Hackback: The Legal Labyrinth of Cybersecurity

In our previous article, we explored how the cybersecurity professional's role as guarantor clashes with classic scenarios such as unauthorized access. However, in my professional and academic experience, I often...

And let the phishing begin! Microsoft is taking action against a zero-day exploit already exploited in Office

Once again, Microsoft was forced to quickly fix some flaws. The company has released unscheduled patches for Microsoft Office, addressing a dangerous zero-day vulnerability that has already been exploited in...

ServiceNow Under Attack: How an Email Can Open the Doors to Your Business

The recent discovery of a vulnerability in ServiceNow’s AI platform has shaken the cybersecurity industry. This flaw, characterized by an extremely high severity score, allowed unauthenticated attackers to impersonate any...

33,000 tons of iron… and an investigation where AIS and logs are cyber intelligence traps

A recent operation in the port of Brindisi, conducted by the Guardia di Finanza in collaboration with the Customs and Monopolies Agency (ADM) and coordinated by the Brindisi Public Prosecutor's...

149 Million Accounts Exposed: The Database No One Should Have Seen

A recent leak revealed 149 million logins and passwords exposed online , including accounts for financial services, social media, gaming, and dating sites. The discovery was made by researcher Jeremiah...

Shocking Discovery on Instagram: Private Posts Accessible Without Login!

The discovery was made by chance: while browsing the mobile web version of Instagram, Jatin Banga noticed that the contents of some private profiles were visible without any authorization. By...

Email Security Under Pressure: Phishing Kits to Double in 2025

According to Barracuda’s Phishing Report 2025 , the number of phishing-as-a-service (PhaaS) kits is expected to double by 2025, placing increasing pressure on security teams to combat an increasingly evolving...

When Malware Hides in Videos! The PixelCode Technique Breaks the Rules

PixelCode began as a research project exploring a hidden technique for storing binary data within images or videos . Instead of leaving a plaintext executable, the file is converted into...

How a simple Visual Studio Code file can become a backdoor for state-run hackers

Security researchers have recently observed a worrying evolution in the offensive tactics attributed to North Korean-linked actors as part of the campaign known as Contagious Interview : no longer simple...

Khaby Lame is selling the rights to his digital identity for $900 million. But there’s reason to think.

Khaby Lame, the world's most followed Italian creator and now a global social media icon, has taken a step that could mark a turning point in the history of the...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE