Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Crowdstrike 320×100
UtiliaCS 970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Orion Leaks: LockBit’s Shadow in Ransomware Ecosystem Cybercrime

Orion Leaks: LockBit’s Shadow in Ransomware Ecosystem

An in-depth look at the infrastructure connections of emerging group Orion Leaks and its possible connection to former RaaS giant...
Raffaela Crisci - 14 January 2026
Cloudflare vs Italy: The Battle for Internet Freedom and DNS Control Cybercrime

Cloudflare vs Italy: The Battle for Internet Freedom and DNS Control

Cloudflare CEO Matthew Prince has threatened to shut down the company's operations in Italy after the country's telecom regulator fined...
Redazione RHC - 14 January 2026
Understanding Data Breach: Protecting Sensitive Information Culture

Understanding Data Breach: Protecting Sensitive Information

One of the most common mistakes, despite the GDPR's implementation since 2018, is to consider only security breaches involving sensitive...
Stefano Gazzella - 14 January 2026
1X NEO Robot Unveils World Model for Advanced Learning Cybercrime

1X NEO Robot Unveils World Model for Advanced Learning

1X has released a major update for its NEO humanoid robot , not promising much but introducing a significant change...
Redazione RHC - 13 January 2026
Cybercrime Meets Real-Life Violence: Foxtrot Network’s Dark Side Cybercrime

Cybercrime Meets Real-Life Violence: Foxtrot Network’s Dark Side

In recent months, there has been increasing talk of a paradigm shift in cybercrime . What for years was perceived...
Redazione RHC - 13 January 2026
EDRStartupHinder: Bypassing Windows EDR Security with BindLink Cybercrime

EDRStartupHinder: Bypassing Windows EDR Security with BindLink

Sometimes, to disable Windows protection , you don't need to attack the antivirus directly. Simply preventing it from starting properly...
Redazione RHC - 13 January 2026

AI-Generated Mac Malware: SimpleStealth Threatens User Security

A group of industry specialists has identified for the first time a macOS malware whose code clearly shows signs of having been generated using artificial intelligence tools . The discovery,...
Share on Facebook Share on LinkedIn Share on X

Linus Torvalds on AI Coding: ‘It’s Just Another Tool’

Linus Torvalds, the creator of Linux, has expressed a firm and uncompromising position regarding the debate over the integration and use of artificial intelligence tools in writing and reviewing Linux...
Share on Facebook Share on LinkedIn Share on X

The Future of Tech: Sovereignty, Security, and Cloud Control

In today's world, technology is no longer a mere tool for efficiency or convenience, but a primary geopolitical lever . Access to digital infrastructure, cloud platforms, and communications systems isn't...
Share on Facebook Share on LinkedIn Share on X

Internet Shutdowns Cost $19.7B in 2025, Sophisticated Censorship Rises

Imagine a situation where the internet appears to be working, but websites won't open beyond the first screen, messaging apps are intermittent, and businesses are constantly changing. According to the...
Share on Facebook Share on LinkedIn Share on X

Doom on a Smart Pressure Cooker: The Ultimate IoT Hack

The line between home appliances and gaming consoles continues to blur. The latest frontier of " extreme porting" features the Krups Cook4Me Connect , a smart pressure cooker that's been...
Share on Facebook Share on LinkedIn Share on X

LockBit 5.0 Ransomware: The Evolving Threat

Cybercrime continues to reinvent itself, and LockBit is one of the most prominent examples. Active since late 2019, the group has become one of the most prolific ransomware operators ever...
Share on Facebook Share on LinkedIn Share on X

Instagram Data Leak Exposes 17.5 Million Users on Dark Web

A massive digital archive containing the private information of approximately 17.5 million Instagram users appears to have fallen into the hands of cybercriminals. A few hours ago, the alarm was...
Share on Facebook Share on LinkedIn Share on X

Phishing Emails Mimic Internal Comms via Microsoft 365 Spoofing

Phishing attacks are becoming increasingly insidious, to the point of perfectly mimicking internal corporate communications . This is the alarm raised by Microsoft, which has observed a significant increase in...
Share on Facebook Share on LinkedIn Share on X

Lovense Emily AI Doll: Revolutionary Companion at CES 2026

At CES 2026 in Las Vegas, Lovense , known for its app-controlled smart toys for adults , decided to make a bold statement in a completely different format . Instead...
Share on Facebook Share on LinkedIn Share on X

HPE OneView Critical Vulnerability Exploited: Update Now to Prevent Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) of the United States of America has raised the alarm about the active exploitation of a critical vulnerability in HPE OneView , an...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCulture
Net-NTLMv1 Exploitation: Rainbow Tables for Modern Attacks
Redazione RHC - 18/01/2026

Mandiant has released a large set of rainbow tables dedicated to Net-NTLMv1 with the aim of concretely demonstrating how insecure this authentication protocol has become. Although Net-NTLMv1 has been deprecated for years and its weaknesses…

Immagine del sitoCybercrime
Your paycheck is zero! Congratulations, someone answered the phone wrong
Redazione RHC - 18/01/2026

No worker would accept their paycheck disappearing without explanation. It was precisely from a series of internal reports of this nature that an organization began investigating an apparently administrative anomaly, discovering instead a targeted cyber…

Immagine del sitoCybercrime
Two Ukrainians Suspected in Black Basta Ransomware Attacks
Redazione RHC - 17/01/2026

When it comes to cybersecurity, it’s not uncommon to come across news stories that seem straight out of a science fiction movie. Yet, the reality is even more surprising and sometimes disturbing. The story of…

Immagine del sitoCybercrime
Gootloader Malware Returns with Enhanced Evasion Techniques
Redazione RHC - 17/01/2026

After a long period of silence, the Gootloader downloader malware has returned to the forefront. Last November, the Huntress team detected a new campaign signaling the return of a developer previously associated with the Vanilla…

Immagine del sitoCybercrime
VoidLink Malware: Advanced Linux Framework Targets Cloud Infrastructures
Redazione RHC - 16/01/2026

Check Point researchers have discovered a new Linux infection framework distinguished by its advanced modular architecture and wide range of features. The malware has been dubbed VoidLink . The framework is composed of over 30…