Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

970x120 Olympous

Latest news

Cloudflare Hit with €14M Fine for Failing to Block Pirate Content Cyber News

Cloudflare Hit with €14M Fine for Failing to Block Pirate Content

The Italian Communications Regulatory Authority (AGCOM) has imposed an administrative fine exceeding €14 million on Cloudflare Inc. for failure to...
Redazione RHC - January 9, 2026
Taiwan Citizens Accused in China of Smuggling and Cable Sabotage Cyber News

Taiwan Citizens Accused in China of Smuggling and Cable Sabotage

Chinese authorities have formally charged two Taiwanese citizens with involvement in a smuggling operation linked to an incident in February...
Sandro Sana - January 9, 2026
QR Code Phishing via HTML: New Attack Vector Emerges Cyber News

QR Code Phishing via HTML: New Attack Vector Emerges

We know that criminal hackers always manage to surprise us, and this time too they surprise us with the innovation...
Silvia Felici - January 8, 2026
VMware ESXi VM Escape Exploit: Advanced Threats Revealed Cyber News

VMware ESXi VM Escape Exploit: Advanced Threats Revealed

A new report published by the Huntress Tactical Response Team documents a highly sophisticated intrusion detected in December 2025 ,...
Silvia Felici - January 8, 2026
Supply Chain Security: Protect Your Business from Cyber Threats Cyber News

Supply Chain Security: Protect Your Business from Cyber Threats

In an increasingly interconnected digital ecosystem, companies depend on networks of suppliers and partners to operate efficiently. However, this interdependence...
Redazione RHC - January 8, 2026
Malware PHALT#BLYX Uses Social Engineering and MSBuild to Infect Systems Cyber News

Malware PHALT#BLYX Uses Social Engineering and MSBuild to Infect Systems

A cancellation message from Booking.com with a high penalty seems like a typical business practice for hotels and apartments. But...
Redazione RHC - January 7, 2026
Critical RCE Vulnerability in D-Link DSL Routers – Update Now Cyber News

Critical RCE Vulnerability in D-Link DSL Routers – Update Now

A critical remote code execution (RCE) flaw in older D-Link DSL routers has been identified as CVE-2026-0625, with a CVSS...
Sandro Sana - January 7, 2026
LED Data Transmission System for Smart Traffic Cyber News

LED Data Transmission System for Smart Traffic

Researchers at Tokyo Polytechnic University have presented a simple and cost-effective wireless data transmission system using LEDs. The project boasts...
Redazione RHC - January 7, 2026
Microsoft’s AI Future: Models to Systems with Satya Nadella Cyber News

Microsoft’s AI Future: Models to Systems with Satya Nadella

With 2026 just around the corner, Microsoft CEO Satya Nadella shared a thoughtful reflection on the state of the AI...
Silvia Felici - January 6, 2026
Patchwork Group Unleashes StreamSpy Malware with WebSocket C2 Channel Cyber News

Patchwork Group Unleashes StreamSpy Malware with WebSocket C2 Channel

The Patchwork hacker group, also known as Dropping Elephant and Maha Grass , has returned to the spotlight after a...
Bajram Zeqiri - January 6, 2026
China Achieves Quantum Error Correction Breakthrough with Microchip Cyber News

China Achieves Quantum Error Correction Breakthrough with Microchip

For years, quantum computers have seemed like a futuristic technology: on paper, they can solve problems that classical machines can’t...
Redazione RHC - January 5, 2026
Critical GNU Wget2 Vulnerability Exposes Users to File Overwrite Attacks Cyber News

Critical GNU Wget2 Vulnerability Exposes Users to File Overwrite Attacks

A serious vulnerability has been discovered in the popular GNU command-line downloader Wget2 , which allows attackers to overwrite files...
Massimiliano Brolli - January 5, 2026

Your MFA is no longer enough: Phishing kits bypass multi-factor authentication

The amount of PhaaS kit has doubled since last year, according to an analysis by Barracuda Networks, placing increased pressure on security teams. Aggressive newcomers Whisper 2FA and GhostFrame introduced...

Nearly 2,000 bugs in 100 dating apps: How your data can be stolen

A study of 100 dating apps revealed a disturbing picture: nearly 2,000 vulnerabilities were detected, 17% of which were classified as critical. The analysis was conducted by AppSec Solutions. The...

MacSync: The macOS malware that empties your wallet… after weeks

A new malware campaign has emerged in the macOS world, one that relies not on sophisticated exploits, but on good old-fashioned social engineering. It's powered by the MacSync malware, distributed...

He arrived in America with $200 and ended up in a reformatory: today he controls 90% of the world’s AI

How three insiders with just $200 in their pockets reached a market capitalization of $5 trillion and created the company that powers over 90% of artificial intelligence. Kentucky, 1972. A...

The Thin Red Line of Criminal Liability in Cybersecurity

This article is the first in a series of three articles exploring the delicate relationship between cybersecurity professionals and the current regulatory framework. In this first installment, we will analyze...

China Bans Western Cybersecurity Software, Cites Security Fears

Chinese authorities have begun quietly eliminating Western solutions from corporate networks in the country. According to Reuters sources, Chinese companies have been advised to stop using cybersecurity software from dozens...

Vulnerabilities discovered in Foxit PDF Editor, Epic Games Store, and MedDream PACS

Recently, the Cisco Talos vulnerability research and discovery team identified a number of vulnerabilities in various software. Specifically, three vulnerabilities were discovered in the Foxit PDF Editor , one vulnerability...

OpenAI API Logs Vulnerability Exposed: Data Exfiltration Risk

Imagine your chatbot worked properly and didn't display a malicious response to the user. But a leak still occurred later, in the most unexpected place, when the developer opened the...

PurpleBravo’s Contagious Interview: Malware Campaign Targets Global Firms

For over a year, the North Korean group PurpleBravo has been running a targeted malware campaign called “Contagious Interview,” using fake job interviews to attack companies in Europe, Asia, the...

KONNI Malware Targets Crypto Developers with AI-Powered Attacks

Check Point Research recently discovered a sophisticated phishing campaign orchestrated by KONNI , a threat group linked to North Korea . Historically focused on diplomatic targets in South Korea, the...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE