Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Cyber Offensive Fundamentals 320x200 1
Banner Ransomfeed 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Google Unveils Nano Banana 2 Flash for Rapid Image Generation Cybercrime

Google Unveils Nano Banana 2 Flash for Rapid Image Generation

Google is preparing to introduce a new generative AI model for image processing: the Nano Banana 2 Flash . It...
Redazione RHC - 4 January 2026
Ancient Chinese Silk Loom: The World’s First Computer? Culture

Ancient Chinese Silk Loom: The World’s First Computer?

When you evaluate a computer not just by its outer casing and display, but fundamentally as a machine that accepts...
Redazione RHC - 3 January 2026
Neuralink’s Brain-Computer Implants to Revolutionize Human Life by 2026 Cybercrime

Neuralink’s Brain-Computer Implants to Revolutionize Human Life by 2026

Neuralink, Elon Musk's brain implant company, is preparing to realize what until recently seemed like science fiction. According to Musk,...
Redazione RHC - 3 January 2026
Zero-Day Exploits on the Rise: How to Protect Your Network Cybercrime

Zero-Day Exploits on the Rise: How to Protect Your Network

Until recently, zero-day vulnerabilities seemed like exotic artifacts from the world of special operations and espionage . Now they're a...
Redazione RHC - 2 January 2026
Long-Lived Technologies: COBOL, C, SQL, and Legacy Systems Culture

Long-Lived Technologies: COBOL, C, SQL, and Legacy Systems

While the industry debates which neural network is the “smartest” and which framework is the “most modern,” decades-old technologies continue...
Redazione RHC - 2 January 2026
PollyPolymer Revolutionizes Robotics with 3D Printed Flexible Components Cybercrime

PollyPolymer Revolutionizes Robotics with 3D Printed Flexible Components

When XPeng unveiled its new humanoid robot this year, the spectacle was designed to inspire disbelief. The robot's movements were...
Redazione RHC - 2 January 2026
sicari a pagamento

The Dark Side of Cybercrime: Human Costs and Consequences

By 2025, cybercrime will increasingly go beyond “just money”: attacks aren’t just about downtime bills and ransom payments , but also about real human consequences, from healthcare disruptions and victim...
Share on Facebook Share on LinkedIn Share on X

OpenAI Hiring Chief Security Officer to Mitigate AI Risks

OpenAI, the developer of ChatGPT, has announced the search for a new Chief Security Officer . The position, with an annual salary of $555,000, will be directly responsible for mitigating...
Share on Facebook Share on LinkedIn Share on X

Petlibro Vulnerabilities Exposed: Control Your Pet’s Safety Now

A series of vulnerabilities have been discovered in the popular Petlibro pet food vending ecosystem. In the worst-case scenario, these vulnerabilities allowed an attacker to log into someone else's account,...
Share on Facebook Share on LinkedIn Share on X

MongoBleed Vulnerability Exploited: Update MongoDB Now to Prevent Data Breach

The Cybersecurity and Infrastructure Security Agency (CISA) has officially raised the alarm about a critical vulnerability in MongoDB, adding the flaw to its catalog of known exploited vulnerabilities (KEVs). This...
Share on Facebook Share on LinkedIn Share on X

Apple Supply Chain Hit by Cyberattack: Sensitive Data at Risk

During the first half of December, a Chinese company assembling devices for Apple was hit by an advanced cyberattack that may have exposed sensitive information related to a production line....
Share on Facebook Share on LinkedIn Share on X

Browser-in-the-Browser Phishing Attack: How to Protect Yourself

This article analyzes a recent and sophisticated phishing campaign that uses the Browser-in-the-Browser (BitB) technique to steal credentials, particularly those from services like Microsoft 365. The BitB attack is notable...
Share on Facebook Share on LinkedIn Share on X

Critical WebKit Vulnerability Exposes iOS Devices to Code Execution

A new report details a critical vulnerability discovered by security researcher Joseph Goydish in Apple's WebKit engine. This security flaw, if exploited in conjunction with other exploits, could allow attackers...
Share on Facebook Share on LinkedIn Share on X

Xspeeder Devices Hit by AI-Discovered Zero-Day Vulnerability CVE-2025-54322

When it comes to cybersecurity, it's easy to fall into the trap of thinking that problems are always far away, that they only affect others. But the reality is that...
Share on Facebook Share on LinkedIn Share on X

TurboDiffusion: AI Video Generation Accelerated Up to 200 Times

Automatic video generation using artificial intelligence took a significant leap on December 25, 2025, when Tsinghua University announced the open source release of TurboDiffusion. The framework, developed by the TSAIL...
Share on Facebook Share on LinkedIn Share on X

OpenAI to Introduce ChatGPT Ads, Revolutionizing AI-Powered Marketing

OpenAI is once again discussing the possibility of introducing advertising into ChatGPT , this time in the form of so-called sponsored content. These aren't traditional banners, but content that could...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Veeam Backup Vulnerability: Critical RCE Flaw Discovered – Update Now
Redazione RHC - 08/01/2026

Backups are generally considered the last line of defense, but this week Veeam reminded us that backup systems themselves can become entry points for attacks. The company released security updates for Backup & Replication ,…

Immagine del sitoCybercrime
When Attack Discovery Becomes Automated, Detection Stops Scaling
Alexander Rogan - 08/01/2026

For much of the past two decades, cybersecurity has been built on a simple assumption: malicious activity can be detected, analysed, and responded to before meaningful damage occurs. This assumption shaped everything from SOC design…

Immagine del sitoCybercrime
CVE-2026-21858: n8n Vulnerability Exposes Thousands of Servers to RCE
Redazione RHC - 08/01/2026

The vulnerability, identified as CVE-2026-21858, which we recently reported on, affects approximately 100,000 servers worldwide, threatening to expose proprietary API keys, customer databases, and AI workflows. The vulnerability, with a CVSS score of 10, has…

Immagine del sitoCybercrime
Disable Windows 11 AI Features Easily with RemoveWindowsAI Tool
Redazione RHC - 07/01/2026

A new open-source script allows Windows 11 users to widely disable the operating system’s built-in artificial intelligence features . The project, developed by Zoicware , is called RemoveWindowsAI and aims to offer greater control over…

Immagine del sitoCybercrime
DevSecOps: Integrating Security into Your Development Process
Massimiliano Brolli - 07/01/2026

When it comes to application security, there’s rarely a single problem. It’s almost always a chain of small flaws, poor decisions, and missing controls that, when added together, pave the way for serious incidents. This…