Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Crowdstrike 320×100
Redhotcyber Banner Sito 970x120px Uscita 101125

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

PentestAgent: Revolutionizing Penetration Testing with AI-Powered Tools Cybercrime

PentestAgent: Revolutionizing Penetration Testing with AI-Powered Tools

PentestAgent is another new open source project developed by the GH05TCREW group that aims to support penetration testing activities through...
Redazione RHC - 5 January 2026
US Treasury Removes Sanctions on Intellexa Spyware Developers Cybercrime

US Treasury Removes Sanctions on Intellexa Spyware Developers

The U.S. Treasury Department unexpectedly removed from its sanctions list three individuals previously accused of ties to Intellexa , the...
Redazione RHC - 5 January 2026
Rue Language: Revolutionizing System Programming with AI Cybercrime

Rue Language: Revolutionizing System Programming with AI

Veteran software developer Steve Klabnik, who helped create Rust and Ruby on Rails, has started work on a new programming...
Redazione RHC - 5 January 2026
Password Security: The Impact of Human Behavior on Password Strength Culture

Password Security: The Impact of Human Behavior on Password Strength

Password security and human behavior are more connected than we think. In previous episodes, we tried to shift our focus:...
Simone D'Agostino - 4 January 2026
Potential Data Breach at Pickett USA Exposes Critical Energy Infrastructure Cybercrime

Potential Data Breach at Pickett USA Exposes Critical Energy Infrastructure

An unknown attacker claims to have hacked Pickett and Associates (Pickett USA), a Florida-based engineering firm, and is now selling...
Redazione RHC - 4 January 2026
Forensic Timeliner: Advanced Digital Forensics Tool for DFIR Analysis Cybercrime

Forensic Timeliner: Advanced Digital Forensics Tool for DFIR Analysis

Forensic Timeliner is a high-performance forensic processing engine designed to support DFIR (Digital Forensics and Incident Response ) analysts in...
Redazione RHC - 4 January 2026

The Dark Side of AI Rights: Why Experts Are Urging Caution

As artificial intelligence develops, the debate over its status and the limits of what is permissible is becoming increasingly heated. One of the most respected researchers in this field, Canadian...
Share on Facebook Share on LinkedIn Share on X

EU’s Child Sexual Abuse Regulation: Balancing Safety and Digital Rights

Before delving into the analysis, it is worth pointing out that this contribution is the first part of a more extensive research. In the next article, we will explore the...
Share on Facebook Share on LinkedIn Share on X

AI Systems Vulnerable to Attacks: Experts Warn of New Threats

At the recent Chaos Communication Congress in Germany, a new alarm was raised about the threats posed by artificial intelligence agents. According to cybersecurity specialist Johann Rehberger , a computer...
Share on Facebook Share on LinkedIn Share on X

China Boosts AI Education with New Strategy to Prepare Students for Digital Age

China's Ministry of Education has announced a structured strengthening of artificial intelligence education , differentiated according to different school levels, with the aim of preparing students with skills suited to...
Share on Facebook Share on LinkedIn Share on X

Finland Seizes Ship in Cable Damage Probe, Cites Security Threat

On Wednesday, December 31, Finnish authorities seized a cargo ship believed to be involved in the damage to an undersea telecommunications cable connecting Helsinki to Tallinn, Estonia. The action was...
Share on Facebook Share on LinkedIn Share on X

Windows X-Lite 11: Optimize Your Old PC with This Lightweight Version

On December 31st, for gamers and older computer users looking for maximum performance, the official version of Windows 11 often seems too heavy. However, the famous Windows X-Lite recently released...
Share on Facebook Share on LinkedIn Share on X

Crypto Malware Hacker Extradited to Korea for $1.18M Theft

A hacker who stole over 1.7 billion won (about $1.18 million) in cryptocurrency using malware that secretly spoofed wallet addresses has been extradited to South Korea. According to the National...
Share on Facebook Share on LinkedIn Share on X

The Dark Side of Convenience: How Digital Payments Threaten Our Privacy

Five days in London, and I felt like I was living inside a permanent demo of the future. The sleek, convenient, frictionless one. The one where you do everything with...
Share on Facebook Share on LinkedIn Share on X

Ransomware Attacks on the Rise: US Professionals Turn to Cybercrime

In the landscape of cybercrime investigations, some cases take on particular significance not only because of the extent of the financial damage, but also because of the profile of the...
Share on Facebook Share on LinkedIn Share on X

Apache StreamPipes Vulnerability: Update to Prevent Admin Takeover

Apache StreamPipes is an open-source platform for real-time data analysis and processing (streaming analytics) , designed especially for IoT, Industry 4.0 and monitoring systems . Simply put: it is used...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Veeam Backup Vulnerability: Critical RCE Flaw Discovered – Update Now
Redazione RHC - 08/01/2026

Backups are generally considered the last line of defense, but this week Veeam reminded us that backup systems themselves can become entry points for attacks. The company released security updates for Backup & Replication ,…

Immagine del sitoCybercrime
When Attack Discovery Becomes Automated, Detection Stops Scaling
Alexander Rogan - 08/01/2026

For much of the past two decades, cybersecurity has been built on a simple assumption: malicious activity can be detected, analysed, and responded to before meaningful damage occurs. This assumption shaped everything from SOC design…

Immagine del sitoCybercrime
CVE-2026-21858: n8n Vulnerability Exposes Thousands of Servers to RCE
Redazione RHC - 08/01/2026

The vulnerability, identified as CVE-2026-21858, which we recently reported on, affects approximately 100,000 servers worldwide, threatening to expose proprietary API keys, customer databases, and AI workflows. The vulnerability, with a CVSS score of 10, has…

Immagine del sitoCybercrime
Disable Windows 11 AI Features Easily with RemoveWindowsAI Tool
Redazione RHC - 07/01/2026

A new open-source script allows Windows 11 users to widely disable the operating system’s built-in artificial intelligence features . The project, developed by Zoicware , is called RemoveWindowsAI and aims to offer greater control over…

Immagine del sitoCybercrime
DevSecOps: Integrating Security into Your Development Process
Massimiliano Brolli - 07/01/2026

When it comes to application security, there’s rarely a single problem. It’s almost always a chain of small flaws, poor decisions, and missing controls that, when added together, pave the way for serious incidents. This…