Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

HackTheBox 970x120 1

Latest news

VoidLink Malware: AI-Generated Threat for Linux Systems Cyber News

VoidLink Malware: AI-Generated Threat for Linux Systems

Agostino Pellegrino - January 20, 2026
Microsoft Ends Support for Windows Server 2008: What It Means Cyber News
The AI Energy Crisis: How Data Centers Are Reshaping US Power Costs Cyber News
ARM: The Future of Low-Power Computing and AI Cyber News

ARM: The Future of Low-Power Computing and AI

Redazione RHC - January 15, 2026
Meta Shifts Focus from Metaverse to AI-Powered Wearables Cyber News
China Leads the Way with Level 3 Autonomous Vehicle License Plates Cyber News
Understanding Data Breach: Protecting Sensitive Information Culture
1X NEO Robot Unveils World Model for Advanced Learning Cyber News

Ransomware doesn’t lock servers, it locks credit. The financial side of cybersecurity

There's this mistaken—somewhat romantic, if you will—idea that ransomware is "IT stuff": a few servers in trouble, a couple of sleepless nights, then you restart and it's over… The reality,...

AI Isn’t as Reliable as You Think: The Hidden Risks of LLMs Without Good Governance

Adopting large language models (LLMs) without adequate governance, verification, and oversight risks legal, financial, and reputational damage. This data emerges from the report "Risks of Unmanaged AI Reliance: Evaluating Regional...

Active Defense and Hackback: The Legal Labyrinth of Cybersecurity

In our previous article, we explored how the cybersecurity professional's role as guarantor clashes with classic scenarios such as unauthorized access. However, in my professional and academic experience, I often...

And let the phishing begin! Microsoft is taking action against a zero-day exploit already exploited in Office

Once again, Microsoft was forced to quickly fix some flaws. The company has released unscheduled patches for Microsoft Office, addressing a dangerous zero-day vulnerability that has already been exploited in...

ServiceNow Under Attack: How an Email Can Open the Doors to Your Business

The recent discovery of a vulnerability in ServiceNow’s AI platform has shaken the cybersecurity industry. This flaw, characterized by an extremely high severity score, allowed unauthenticated attackers to impersonate any...

33,000 tons of iron… and an investigation where AIS and logs are cyber intelligence traps

A recent operation in the port of Brindisi, conducted by the Guardia di Finanza in collaboration with the Customs and Monopolies Agency (ADM) and coordinated by the Brindisi Public Prosecutor's...

Email Security Under Pressure: Phishing Kits to Double in 2025

According to Barracuda’s Phishing Report 2025 , the number of phishing-as-a-service (PhaaS) kits is expected to double by 2025, placing increasing pressure on security teams to combat an increasingly evolving...

How a simple Visual Studio Code file can become a backdoor for state-run hackers

Security researchers have recently observed a worrying evolution in the offensive tactics attributed to North Korean-linked actors as part of the campaign known as Contagious Interview : no longer simple...

Khaby Lame is selling the rights to his digital identity for $900 million. But there’s reason to think.

Khaby Lame, the world's most followed Italian creator and now a global social media icon, has taken a step that could mark a turning point in the history of the...

Microsoft Teams will know where you are: your geographic location will be inferred from your Wi-Fi

Microsoft is preparing to introduce an update that will transform a small manual habit into a system-wide automation. Soon, Microsoft Teams will be able to infer and display a user's...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE