Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

970x120 Olympous
Precedente Successivo

Latest news

And let the phishing begin! Microsoft is taking action against a zero-day exploit already exploited in Office Cyber News

And let the phishing begin! Microsoft is taking action against a zero-day exploit already exploited in Office

Once again, Microsoft was forced to quickly fix some flaws. The company has released unscheduled patches for Microsoft Office, addressing...
Pietro Melillo - January 27, 2026
ServiceNow Under Attack: How an Email Can Open the Doors to Your Business Cyber News

ServiceNow Under Attack: How an Email Can Open the Doors to Your Business

The recent discovery of a vulnerability in ServiceNow’s AI platform has shaken the cybersecurity industry. This flaw, characterized by an...
Redazione RHC - January 27, 2026
33,000 tons of iron… and an investigation where AIS and logs are cyber intelligence traps Cyberpolitics

33,000 tons of iron… and an investigation where AIS and logs are cyber intelligence traps

A recent operation in the port of Brindisi, conducted by the Guardia di Finanza in collaboration with the Customs and...
Roberto Villani - January 27, 2026
149 Million Accounts Exposed: The Database No One Should Have Seen Cybercrime

149 Million Accounts Exposed: The Database No One Should Have Seen

A recent leak revealed 149 million logins and passwords exposed online , including accounts for financial services, social media, gaming,...
Redazione RHC - January 26, 2026
Email Security Under Pressure: Phishing Kits to Double in 2025 Cyber News

Email Security Under Pressure: Phishing Kits to Double in 2025

According to Barracuda’s Phishing Report 2025 , the number of phishing-as-a-service (PhaaS) kits is expected to double by 2025, placing...
Redazione RHC - January 26, 2026
When Malware Hides in Videos! The PixelCode Technique Breaks the Rules Cybercrime

When Malware Hides in Videos! The PixelCode Technique Breaks the Rules

PixelCode began as a research project exploring a hidden technique for storing binary data within images or videos . Instead...
Marcello Filacchioni - January 26, 2026

BlueNoroff: The Hacker Group Revolutionizing Cybercrime

The BlueNoroff hacker group has long since transformed cybercrime into a high-tech business, with tens of millions of dollars, cryptocurrency assets, and entire financial ecosystems at stake. A report by...

FortiGate and FortiCloud SSO: When Patches Don’t Really Close the Door

A widespread and dangerous belief has been circulating in the security world for years: “if it's patched, it's safe” . The case of FortiCloud SSO administrative access to FortiGate devices...

Your MFA is no longer enough: Phishing kits bypass multi-factor authentication

The amount of PhaaS kit has doubled since last year, according to an analysis by Barracuda Networks, placing increased pressure on security teams. Aggressive newcomers Whisper 2FA and GhostFrame introduced...

Nearly 2,000 bugs in 100 dating apps: How your data can be stolen

A study of 100 dating apps revealed a disturbing picture: nearly 2,000 vulnerabilities were detected, 17% of which were classified as critical. The analysis was conducted by AppSec Solutions. The...

MacSync: The macOS malware that empties your wallet… after weeks

A new malware campaign has emerged in the macOS world, one that relies not on sophisticated exploits, but on good old-fashioned social engineering. It's powered by the MacSync malware, distributed...

He arrived in America with $200 and ended up in a reformatory: today he controls 90% of the world’s AI

How three insiders with just $200 in their pockets reached a market capitalization of $5 trillion and created the company that powers over 90% of artificial intelligence. Kentucky, 1972. A...

The Thin Red Line of Criminal Liability in Cybersecurity

This article is the first in a series of three articles exploring the delicate relationship between cybersecurity professionals and the current regulatory framework. In this first installment, we will analyze...

China Bans Western Cybersecurity Software, Cites Security Fears

Chinese authorities have begun quietly eliminating Western solutions from corporate networks in the country. According to Reuters sources, Chinese companies have been advised to stop using cybersecurity software from dozens...

Vulnerabilities discovered in Foxit PDF Editor, Epic Games Store, and MedDream PACS

Recently, the Cisco Talos vulnerability research and discovery team identified a number of vulnerabilities in various software. Specifically, three vulnerabilities were discovered in the Foxit PDF Editor , one vulnerability...

Larva-25012 Proxyjacking Campaign Targets South Korea with Notepad++ Malware

A sophisticated proxyjacking campaign is targeting systems in South Korea, attributed to the actor Larva-25012 , which distributes proxyware disguised as legitimate Notepad++ installers. The campaign demonstrates significant technical evolution,...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE