Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Banner Ransomfeed 970x120 1
Precedente Successivo

Latest news

KONNI Malware Targets Crypto Developers with AI-Powered Attacks Cyber News

KONNI Malware Targets Crypto Developers with AI-Powered Attacks

Check Point Research recently discovered a sophisticated phishing campaign orchestrated by KONNI , a threat group linked to North Korea...
Stefano Gazzella - January 22, 2026
Zoom Security Alert: Critical Vulnerability in Node MMR Devices Cyber News

Zoom Security Alert: Critical Vulnerability in Node MMR Devices

Zoom Video Communications has issued an urgent security advisory for a critical vulnerability (identified as CVE-2026-22844 ) affecting its enterprise...
Silvia Felici - January 22, 2026
LockBit 5.0 Ransomware: New Threats and Advanced Tactics Cybercrime

LockBit 5.0 Ransomware: New Threats and Advanced Tactics

The LockBit group, which many had quickly dismissed after high-profile failures and leaks, unexpectedly returned to the scene. In the...
Pietro Melillo - January 22, 2026
Cisco Zero-Day Vulnerability CVE-2026-20045 Actively Exploited Vulnerability

Cisco Zero-Day Vulnerability CVE-2026-20045 Actively Exploited

A critical zero-day remote code execution (RCE) vulnerability, identified as CVE-2026-20045, has been discovered by Cisco and is being actively...
Agostino Pellegrino - January 22, 2026
Cybersecurity in Local Administrations: The Hidden Risk Cybercrime

Cybersecurity in Local Administrations: The Hidden Risk

There's a convenient misconception in Italy: thinking that cybersecurity is a matter for ministries or large strategic players. It's reassuring....
Roberto Villani - January 22, 2026
UK Organizations Hit by Russia-Backed DDoS Attacks Cyber News

UK Organizations Hit by Russia-Backed DDoS Attacks

The UK's National Cyber Security Centre has issued a strong warning regarding a series of denial-of-service (DDoS) attacks targeting British...
Redazione RHC - January 22, 2026

Phishing Emails Mimic Internal Comms via Microsoft 365 Spoofing

Phishing attacks are becoming increasingly insidious, to the point of perfectly mimicking internal corporate communications . This is the alarm raised by Microsoft, which has observed a significant increase in...

Lovense Emily AI Doll: Revolutionary Companion at CES 2026

At CES 2026 in Las Vegas, Lovense , known for its app-controlled smart toys for adults , decided to make a bold statement in a completely different format . Instead...

The Revolutionary iPhone Launch: A Game-Changing Moment in Tech History

San Francisco: January 9, 2007 There was something strange about the air, like when you know something's about to happen but you don't know what. Steve Jobs was on stage...

Cloudflare Hit with €14M Fine for Failing to Block Pirate Content

The Italian Communications Regulatory Authority (AGCOM) has imposed an administrative fine exceeding €14 million on Cloudflare Inc. for failure to comply with Italian legislation against online piracy. The measure was...

Taiwan Citizens Accused in China of Smuggling and Cable Sabotage

Chinese authorities have formally charged two Taiwanese citizens with involvement in a smuggling operation linked to an incident in February that damaged an undersea cable and fueled renewed tensions between...

QR Code Phishing via HTML: New Attack Vector Emerges

We know that criminal hackers always manage to surprise us, and this time too they surprise us with the innovation and ways they invent to overcome obstacles, such as anti-spam...

When Attack Discovery Becomes Automated, Detection Stops Scaling

For much of the past two decades, cybersecurity has been built on a simple assumption: malicious activity can be detected, analysed, and responded to before meaningful damage occurs. This assumption...

VMware ESXi VM Escape Exploit: Advanced Threats Revealed

A new report published by the Huntress Tactical Response Team documents a highly sophisticated intrusion detected in December 2025 , in which an advanced actor managed to compromise a VMware...

Supply Chain Security: Protect Your Business from Cyber Threats

In an increasingly interconnected digital ecosystem, companies depend on networks of suppliers and partners to operate efficiently. However, this interdependence has transformed the supply chain into a new critical cybersecurity...

CVE-2026-21858: n8n Vulnerability Exposes Thousands of Servers to RCE

The vulnerability, identified as CVE-2026-21858, which we recently reported on, affects approximately 100,000 servers worldwide, threatening to expose proprietary API keys, customer databases, and AI workflows. The vulnerability, with a...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE