Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Cyber Offensive Fundamentals 320x200 V0.1
Banner Desktop

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

24-Year-Old Hacker Breaches US Supreme Court Database Cyber News

24-Year-Old Hacker Breaches US Supreme Court Database

Do you remember the 24-year-old hacker Carmelo Miano and the breaches of the Naples Prosecutor's Office's accounts and computer systems?...
Redazione RHC - 14 January 2026
Cyberattack Hits Belgian Hospital AZ Monica, Ransomware Used Cyber News

Cyberattack Hits Belgian Hospital AZ Monica, Ransomware Used

In the early morning hours of January 13, one of Belgium's leading hospitals suddenly found itself nearly paralyzed. AZ Monica,...
Redazione RHC - 14 January 2026
Meta Shifts Focus from Metaverse to AI-Powered Wearables Cyber News

Meta Shifts Focus from Metaverse to AI-Powered Wearables

Meta is launching a new internal reorganization process that directly involves Reality Labs, its virtual reality division, and the Metaverse....
Redazione RHC - 14 January 2026
Anthropic’s Claude AI Takes Control with Computer Use Feature Cyber News

Anthropic’s Claude AI Takes Control with Computer Use Feature

Anthropic continues to push the evolution of AI-powered assistants, expanding Claude 's capabilities beyond simple text interaction. After establishing its...
Redazione RHC - 14 January 2026
China Leads the Way with Level 3 Autonomous Vehicle License Plates Cyber News

China Leads the Way with Level 3 Autonomous Vehicle License Plates

On December 23, the Traffic Management Bureau of the Beijing Municipal Public Security Bureau officially issued the first batch of...
Redazione RHC - 14 January 2026
Orion Leaks: LockBit’s Shadow in Ransomware Ecosystem Cyber crime

Orion Leaks: LockBit’s Shadow in Ransomware Ecosystem

An in-depth look at the infrastructure connections of emerging group Orion Leaks and its possible connection to former RaaS giant...
Raffaela Crisci - 14 January 2026

QR Code Phishing via HTML: New Attack Vector Emerges

We know that criminal hackers always manage to surprise us, and this time too they surprise us with the innovation and ways they invent to overcome obstacles, such as anti-spam...
Share on Facebook Share on LinkedIn Share on X

Veeam Backup Vulnerability: Critical RCE Flaw Discovered – Update Now

Backups are generally considered the last line of defense, but this week Veeam reminded us that backup systems themselves can become entry points for attacks. The company released security updates...
Share on Facebook Share on LinkedIn Share on X

GoBruteforcer Botnet Exploits AI-Generated Server Configs, Targets Crypto

The GoBruteforcer botnet has been discovered to be exploiting a surprisingly current weakness: the widespread reuse of AI-generated server configurations. This increasingly widespread practice is effectively leaving tens of thousands...
Share on Facebook Share on LinkedIn Share on X

When Attack Discovery Becomes Automated, Detection Stops Scaling

For much of the past two decades, cybersecurity has been built on a simple assumption: malicious activity can be detected, analysed, and responded to before meaningful damage occurs. This assumption...
Share on Facebook Share on LinkedIn Share on X

VMware ESXi VM Escape Exploit: Advanced Threats Revealed

A new report published by the Huntress Tactical Response Team documents a highly sophisticated intrusion detected in December 2025 , in which an advanced actor managed to compromise a VMware...
Share on Facebook Share on LinkedIn Share on X

Supply Chain Security: Protect Your Business from Cyber Threats

In an increasingly interconnected digital ecosystem, companies depend on networks of suppliers and partners to operate efficiently. However, this interdependence has transformed the supply chain into a new critical cybersecurity...
Share on Facebook Share on LinkedIn Share on X

CVE-2026-21858: n8n Vulnerability Exposes Thousands of Servers to RCE

The vulnerability, identified as CVE-2026-21858, which we recently reported on, affects approximately 100,000 servers worldwide, threatening to expose proprietary API keys, customer databases, and AI workflows. The vulnerability, with a...
Share on Facebook Share on LinkedIn Share on X

Malware PHALT#BLYX Uses Social Engineering and MSBuild to Infect Systems

A cancellation message from Booking.com with a high penalty seems like a typical business practice for hotels and apartments. But it's precisely this type of email that triggered a new...
Share on Facebook Share on LinkedIn Share on X

Disable Windows 11 AI Features Easily with RemoveWindowsAI Tool

A new open-source script allows Windows 11 users to widely disable the operating system's built-in artificial intelligence features . The project, developed by Zoicware , is called RemoveWindowsAI and aims...
Share on Facebook Share on LinkedIn Share on X

DevSecOps: Integrating Security into Your Development Process

When it comes to application security, there's rarely a single problem. It's almost always a chain of small flaws, poor decisions, and missing controls that, when added together, pave the...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCyber News
NoName057(16) hits Italy 487 times in the last 3 months: the DDoS wave does not stop
Redazione RHC - 24/01/2026

Italy has confirmed itself as one of the main targets of the DDoS attack campaign carried out by the hacktivist group NoName057(16) . According to what was declared directly by the collective, our country has…

Immagine del sitoCyber News
NexPhone: Three operating systems in your pocket! The phone that challenges the very concept of a PC.
Redazione RHC - 23/01/2026

The question has been circulating for over ten years: can a smartphone really replace a computer? Over time, the industry has repeatedly attempted to provide a concrete answer, without ever reaching a definitive solution. From…

Immagine del sitoCyber News
BlueNoroff: The Hacker Group Revolutionizing Cybercrime
Redazione RHC - 23/01/2026

The BlueNoroff hacker group has long since transformed cybercrime into a high-tech business, with tens of millions of dollars, cryptocurrency assets, and entire financial ecosystems at stake. A report by Picus Security details the group’s…

Immagine del sitoCyber News
Nearly 2,000 bugs in 100 dating apps: How your data can be stolen
Redazione RHC - 23/01/2026

A study of 100 dating apps revealed a disturbing picture: nearly 2,000 vulnerabilities were detected, 17% of which were classified as critical. The analysis was conducted by AppSec Solutions. The study’s results were published by…

Immagine del sitoCyber News
MacSync: The macOS malware that empties your wallet… after weeks
Redazione RHC - 23/01/2026

A new malware campaign has emerged in the macOS world, one that relies not on sophisticated exploits, but on good old-fashioned social engineering. It’s powered by the MacSync malware, distributed using the ” malware-as-a-service ”…