Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Banner Ransomfeed 970x120 1
Precedente Successivo

Latest news

QR Code Phishing via HTML: New Attack Vector Emerges Cyber News
VMware ESXi VM Escape Exploit: Advanced Threats Revealed Cyber News
Supply Chain Security: Protect Your Business from Cyber Threats Cyber News
LED Data Transmission System for Smart Traffic Cyber News

LED Data Transmission System for Smart Traffic

Redazione RHC - January 7, 2026
Microsoft’s AI Future: Models to Systems with Satya Nadella Cyber News
Critical GNU Wget2 Vulnerability Exposes Users to File Overwrite Attacks Cyber News
US Treasury Removes Sanctions on Intellexa Spyware Developers Cyber News

MacSync: The macOS malware that empties your wallet… after weeks

A new malware campaign has emerged in the macOS world, one that relies not on sophisticated exploits, but on good old-fashioned social engineering. It's powered by the MacSync malware, distributed...

He arrived in America with $200 and ended up in a reformatory: today he controls 90% of the world’s AI

How three insiders with just $200 in their pockets reached a market capitalization of $5 trillion and created the company that powers over 90% of artificial intelligence. Kentucky, 1972. A...

The Thin Red Line of Criminal Liability in Cybersecurity

This article is the first in a series of three articles exploring the delicate relationship between cybersecurity professionals and the current regulatory framework. In this first installment, we will analyze...

China Bans Western Cybersecurity Software, Cites Security Fears

Chinese authorities have begun quietly eliminating Western solutions from corporate networks in the country. According to Reuters sources, Chinese companies have been advised to stop using cybersecurity software from dozens...

Vulnerabilities discovered in Foxit PDF Editor, Epic Games Store, and MedDream PACS

Recently, the Cisco Talos vulnerability research and discovery team identified a number of vulnerabilities in various software. Specifically, three vulnerabilities were discovered in the Foxit PDF Editor , one vulnerability...

OpenAI API Logs Vulnerability Exposed: Data Exfiltration Risk

Imagine your chatbot worked properly and didn't display a malicious response to the user. But a leak still occurred later, in the most unexpected place, when the developer opened the...

PurpleBravo’s Contagious Interview: Malware Campaign Targets Global Firms

For over a year, the North Korean group PurpleBravo has been running a targeted malware campaign called “Contagious Interview,” using fake job interviews to attack companies in Europe, Asia, the...

KONNI Malware Targets Crypto Developers with AI-Powered Attacks

Check Point Research recently discovered a sophisticated phishing campaign orchestrated by KONNI , a threat group linked to North Korea . Historically focused on diplomatic targets in South Korea, the...

Zoom Security Alert: Critical Vulnerability in Node MMR Devices

Zoom Video Communications has issued an urgent security advisory for a critical vulnerability (identified as CVE-2026-22844 ) affecting its enterprise infrastructure. The issue involves a command injection flaw in Zoom...

LockBit 5.0 Ransomware: New Threats and Advanced Tactics

The LockBit group, which many had quickly dismissed after high-profile failures and leaks, unexpectedly returned to the scene. In the fall of 2025, it unveiled a new version of its...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE