Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Enterprise BusinessLog 320x200 1
Redhotcyber Banner Sito 970x120px Uscita 101125

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

When Attack Discovery Becomes Automated, Detection Stops Scaling Cybercrime

When Attack Discovery Becomes Automated, Detection Stops Scaling

For much of the past two decades, cybersecurity has been built on a simple assumption: malicious activity can be detected,...
Alexander Rogan - 8 January 2026
VMware ESXi VM Escape Exploit: Advanced Threats Revealed Cybercrime

VMware ESXi VM Escape Exploit: Advanced Threats Revealed

A new report published by the Huntress Tactical Response Team documents a highly sophisticated intrusion detected in December 2025 ,...
Redazione RHC - 8 January 2026
Supply Chain Security: Protect Your Business from Cyber Threats Cybercrime

Supply Chain Security: Protect Your Business from Cyber Threats

In an increasingly interconnected digital ecosystem, companies depend on networks of suppliers and partners to operate efficiently. However, this interdependence...
Redazione RHC - 8 January 2026
CVE-2026-21858: n8n Vulnerability Exposes Thousands of Servers to RCE Cybercrime

CVE-2026-21858: n8n Vulnerability Exposes Thousands of Servers to RCE

The vulnerability, identified as CVE-2026-21858, which we recently reported on, affects approximately 100,000 servers worldwide, threatening to expose proprietary API...
Redazione RHC - 8 January 2026
Malware PHALT#BLYX Uses Social Engineering and MSBuild to Infect Systems Cybercrime

Malware PHALT#BLYX Uses Social Engineering and MSBuild to Infect Systems

A cancellation message from Booking.com with a high penalty seems like a typical business practice for hotels and apartments. But...
Redazione RHC - 7 January 2026
Disable Windows 11 AI Features Easily with RemoveWindowsAI Tool Cybercrime

Disable Windows 11 AI Features Easily with RemoveWindowsAI Tool

A new open-source script allows Windows 11 users to widely disable the operating system's built-in artificial intelligence features . The...
Redazione RHC - 7 January 2026

China Boosts AI Education with New Strategy to Prepare Students for Digital Age

China's Ministry of Education has announced a structured strengthening of artificial intelligence education , differentiated according to different school levels, with the aim of preparing students with skills suited to...
Share on Facebook Share on LinkedIn Share on X

Finland Seizes Ship in Cable Damage Probe, Cites Security Threat

On Wednesday, December 31, Finnish authorities seized a cargo ship believed to be involved in the damage to an undersea telecommunications cable connecting Helsinki to Tallinn, Estonia. The action was...
Share on Facebook Share on LinkedIn Share on X

Windows X-Lite 11: Optimize Your Old PC with This Lightweight Version

On December 31st, for gamers and older computer users looking for maximum performance, the official version of Windows 11 often seems too heavy. However, the famous Windows X-Lite recently released...
Share on Facebook Share on LinkedIn Share on X

Crypto Malware Hacker Extradited to Korea for $1.18M Theft

A hacker who stole over 1.7 billion won (about $1.18 million) in cryptocurrency using malware that secretly spoofed wallet addresses has been extradited to South Korea. According to the National...
Share on Facebook Share on LinkedIn Share on X

The Dark Side of Convenience: How Digital Payments Threaten Our Privacy

Five days in London, and I felt like I was living inside a permanent demo of the future. The sleek, convenient, frictionless one. The one where you do everything with...
Share on Facebook Share on LinkedIn Share on X

Ransomware Attacks on the Rise: US Professionals Turn to Cybercrime

In the landscape of cybercrime investigations, some cases take on particular significance not only because of the extent of the financial damage, but also because of the profile of the...
Share on Facebook Share on LinkedIn Share on X

Apache StreamPipes Vulnerability: Update to Prevent Admin Takeover

Apache StreamPipes is an open-source platform for real-time data analysis and processing (streaming analytics) , designed especially for IoT, Industry 4.0 and monitoring systems . Simply put: it is used...
Share on Facebook Share on LinkedIn Share on X
sicari a pagamento

The Dark Side of Cybercrime: Human Costs and Consequences

By 2025, cybercrime will increasingly go beyond “just money”: attacks aren’t just about downtime bills and ransom payments , but also about real human consequences, from healthcare disruptions and victim...
Share on Facebook Share on LinkedIn Share on X

OpenAI Hiring Chief Security Officer to Mitigate AI Risks

OpenAI, the developer of ChatGPT, has announced the search for a new Chief Security Officer . The position, with an annual salary of $555,000, will be directly responsible for mitigating...
Share on Facebook Share on LinkedIn Share on X

Petlibro Vulnerabilities Exposed: Control Your Pet’s Safety Now

A series of vulnerabilities have been discovered in the popular Petlibro pet food vending ecosystem. In the worst-case scenario, these vulnerabilities allowed an attacker to log into someone else's account,...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Google Fast Pair Vulnerability: WhisperPair Exposes Millions of Devices
Redazione RHC - 19/01/2026

Researchers from the Cybersecurity and Industrial Cryptography team at KU Leuven have discovered a critical flaw in the Google Fast Pair protocol. The vulnerability allows attackers to hijack control of millions of Bluetooth devices, track…

Immagine del sitoCybercrime
Elon Musk Sues OpenAI for $134 Billion Over AI Betrayal
Redazione RHC - 19/01/2026

Elon Musk has filed a staggering $134 billion in damages in a malicious lawsuit against OpenAI and Microsoft. According to Bloomberg , the latest lawsuit accuses OpenAI of betraying its core mission as a nonprofit…

Immagine del sitoCulture
Net-NTLMv1 Exploitation: Rainbow Tables for Modern Attacks
Redazione RHC - 18/01/2026

Mandiant has released a large set of rainbow tables dedicated to Net-NTLMv1 with the aim of concretely demonstrating how insecure this authentication protocol has become. Although Net-NTLMv1 has been deprecated for years and its weaknesses…

Immagine del sitoCybercrime
Your paycheck is zero! Congratulations, someone answered the phone wrong
Redazione RHC - 18/01/2026

No worker would accept their paycheck disappearing without explanation. It was precisely from a series of internal reports of this nature that an organization began investigating an apparently administrative anomaly, discovering instead a targeted cyber…

Immagine del sitoCybercrime
Two Ukrainians Suspected in Black Basta Ransomware Attacks
Redazione RHC - 17/01/2026

When it comes to cybersecurity, it’s not uncommon to come across news stories that seem straight out of a science fiction movie. Yet, the reality is even more surprising and sometimes disturbing. The story of…