Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
LECS 970x120 1

Red Hot Cyber – News and insights on cybercrime and cybersecurity

Precedente Successivo

Latest news

Vulnerabilities discovered in Foxit PDF Editor, Epic Games Store, and MedDream PACS Cyber News

Vulnerabilities discovered in Foxit PDF Editor, Epic Games Store, and MedDream PACS

Recently, the Cisco Talos vulnerability research and discovery team identified a number of vulnerabilities in various software. Specifically, three vulnerabilities...
Massimiliano Brolli - January 22, 2026
Larva-25012 Proxyjacking Campaign Targets South Korea with Notepad++ Malware Cyber News

Larva-25012 Proxyjacking Campaign Targets South Korea with Notepad++ Malware

A sophisticated proxyjacking campaign is targeting systems in South Korea, attributed to the actor Larva-25012 , which distributes proxyware disguised...
Redazione RHC - January 22, 2026
OpenAI API Logs Vulnerability Exposed: Data Exfiltration Risk Cyber News

OpenAI API Logs Vulnerability Exposed: Data Exfiltration Risk

Imagine your chatbot worked properly and didn't display a malicious response to the user. But a leak still occurred later,...
Redazione RHC - January 22, 2026
PurpleBravo’s Contagious Interview: Malware Campaign Targets Global Firms Cyber News

PurpleBravo’s Contagious Interview: Malware Campaign Targets Global Firms

For over a year, the North Korean group PurpleBravo has been running a targeted malware campaign called “Contagious Interview,” using...
Sandro Sana - January 22, 2026
KONNI Malware Targets Crypto Developers with AI-Powered Attacks Cyber News

KONNI Malware Targets Crypto Developers with AI-Powered Attacks

Check Point Research recently discovered a sophisticated phishing campaign orchestrated by KONNI , a threat group linked to North Korea...
Stefano Gazzella - January 22, 2026
LastPass Phishing Attack: Protect Your Master Password Now Cyber News

LastPass Phishing Attack: Protect Your Master Password Now

On January 21, 2026, LastPass warned its users about a new and active phishing campaign aimed at stealing customers' master...
Redazione RHC - January 22, 2026

Cyberattack Hits Belgian Hospital AZ Monica, Ransomware Used

In the early morning hours of January 13, one of Belgium's leading hospitals suddenly found itself nearly paralyzed. AZ Monica, with locations in Antwerp and Deurne, was hit by a...

Meta Shifts Focus from Metaverse to AI-Powered Wearables

Meta is launching a new internal reorganization process that directly involves Reality Labs, its virtual reality division, and the Metaverse. According to Bloomberg, the company has begun cutting over 1,000...

Anthropic’s Claude AI Takes Control with Computer Use Feature

Anthropic continues to push the evolution of AI-powered assistants, expanding Claude 's capabilities beyond simple text interaction. After establishing its presence among developers and enterprises , the company has introduced...

China Leads the Way with Level 3 Autonomous Vehicle License Plates

On December 23, the Traffic Management Bureau of the Beijing Municipal Public Security Bureau officially issued the first batch of Level 3 autonomous driving license plates to three connected intelligent...

Orion Leaks: LockBit’s Shadow in Ransomware Ecosystem

An in-depth look at the infrastructure connections of emerging group Orion Leaks and its possible connection to former RaaS giant LockBit. In recent months, following Operation Cronos , conducted by...

Cloudflare vs Italy: The Battle for Internet Freedom and DNS Control

Cloudflare CEO Matthew Prince has threatened to shut down the company's operations in Italy after the country's telecom regulator fined it twice its annual revenue in the country. The facts...

Understanding Data Breach: Protecting Sensitive Information

One of the most common mistakes, despite the GDPR's implementation since 2018, is to consider only security breaches involving sensitive data as data breaches. This is often a fatal error...

1X NEO Robot Unveils World Model for Advanced Learning

1X has released a major update for its NEO humanoid robot , not promising much but introducing a significant change to its learning logic. The new module, called 1X World...

Cybercrime Meets Real-Life Violence: Foxtrot Network’s Dark Side

In recent months, there has been increasing talk of a paradigm shift in cybercrime . What for years was perceived as a predominantly digital ecosystem— consisting of fraud, identity theft,...

EDRStartupHinder: Bypassing Windows EDR Security with BindLink

Sometimes, to disable Windows protection , you don't need to attack the antivirus directly. Simply preventing it from starting properly is sufficient. A researcher who goes by the name Two...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE