Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
UtiliaCS 320x100
Banner Desktop

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

LockBit 5.0 Ransomware: The Evolving Threat Cybercrime

LockBit 5.0 Ransomware: The Evolving Threat

Cybercrime continues to reinvent itself, and LockBit is one of the most prominent examples. Active since late 2019, the group...
Redazione RHC - 10 January 2026
Instagram Data Leak Exposes 17.5 Million Users on Dark Web Cybercrime

Instagram Data Leak Exposes 17.5 Million Users on Dark Web

A massive digital archive containing the private information of approximately 17.5 million Instagram users appears to have fallen into the...
Redazione RHC - 10 January 2026
Phishing Emails Mimic Internal Comms via Microsoft 365 Spoofing Cybercrime

Phishing Emails Mimic Internal Comms via Microsoft 365 Spoofing

Phishing attacks are becoming increasingly insidious, to the point of perfectly mimicking internal corporate communications . This is the alarm...
Redazione RHC - 10 January 2026
Lovense Emily AI Doll: Revolutionary Companion at CES 2026 Cybercrime

Lovense Emily AI Doll: Revolutionary Companion at CES 2026

At CES 2026 in Las Vegas, Lovense , known for its app-controlled smart toys for adults , decided to make...
Redazione RHC - 9 January 2026
HPE OneView Critical Vulnerability Exploited: Update Now to Prevent Attacks Cybercrime

HPE OneView Critical Vulnerability Exploited: Update Now to Prevent Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) of the United States of America has raised the alarm about the active...
Redazione RHC - 9 January 2026
Undertow Vulnerability CVE-2025-12543 Exposes Java Ecosystem to Critical Security Risks Cybercrime

Undertow Vulnerability CVE-2025-12543 Exposes Java Ecosystem to Critical Security Risks

A flaw has been discovered in the foundation of the Java web ecosystem. Undertow , the high-performance web server that...
Redazione RHC - 9 January 2026

Long-Lived Technologies: COBOL, C, SQL, and Legacy Systems

While the industry debates which neural network is the “smartest” and which framework is the “most modern,” decades-old technologies continue to quietly swirl beneath the surface of the banking industry...
Share on Facebook Share on LinkedIn Share on X

PollyPolymer Revolutionizes Robotics with 3D Printed Flexible Components

When XPeng unveiled its new humanoid robot this year, the spectacle was designed to inspire disbelief. The robot's movements were so lifelike that company founder He Xiaopeng had to cut...
Share on Facebook Share on LinkedIn Share on X

GlassWorm Malware Targets macOS via Open VSX Extensions

A new wave of malicious extensions has been discovered in the Open VSX extension store, used by millions of developers. Koi experts warn that attackers are pushing "useful" plugins into...
Share on Facebook Share on LinkedIn Share on X

AI Job Losses: Geoffrey Hinton Warns of Widespread Unemployment by 2026

Computer science professor Geoffrey Hinton , one of the founders of modern artificial intelligence technologies, has claimed that AI could lead to large-scale job losses as early as 2026. According...
Share on Facebook Share on LinkedIn Share on X

NVIDIA Tegra X2 Vulnerability: Millions of Devices at Risk

At the 39th annual Chaos Communications Conference (39C3) , security researcher Amber Katze, 22, announced that she has completely analyzed and cracked the secure boot mechanism of the NVIDIA Tegra...
Share on Facebook Share on LinkedIn Share on X

China Regulates AI Chatbots with Human-like Interaction

Chatbots are everywhere now. We've all encountered those virtual assistants that answer our questions, provide us with information, and sometimes seem downright intelligent. But what happens when these chatbots become...
Share on Facebook Share on LinkedIn Share on X

The Dark Side of AI Rights: Why Experts Are Urging Caution

As artificial intelligence develops, the debate over its status and the limits of what is permissible is becoming increasingly heated. One of the most respected researchers in this field, Canadian...
Share on Facebook Share on LinkedIn Share on X

EU’s Child Sexual Abuse Regulation: Balancing Safety and Digital Rights

Before delving into the analysis, it is worth pointing out that this contribution is the first part of a more extensive research. In the next article, we will explore the...
Share on Facebook Share on LinkedIn Share on X

AI Systems Vulnerable to Attacks: Experts Warn of New Threats

At the recent Chaos Communication Congress in Germany, a new alarm was raised about the threats posed by artificial intelligence agents. According to cybersecurity specialist Johann Rehberger , a computer...
Share on Facebook Share on LinkedIn Share on X

China Boosts AI Education with New Strategy to Prepare Students for Digital Age

China's Ministry of Education has announced a structured strengthening of artificial intelligence education , differentiated according to different school levels, with the aim of preparing students with skills suited to...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Larva-25012 Proxyjacking Campaign Targets South Korea with Notepad++ Malware
Redazione RHC - 22/01/2026

A sophisticated proxyjacking campaign is targeting systems in South Korea, attributed to the actor Larva-25012 , which distributes proxyware disguised as legitimate Notepad++ installers. The campaign demonstrates significant technical evolution, using process injection in explorer.exe…

Immagine del sitoCybercrime
PurpleBravo’s Contagious Interview: Malware Campaign Targets Global Firms
Redazione RHC - 22/01/2026

For over a year, the North Korean group PurpleBravo has been running a targeted malware campaign called “Contagious Interview,” using fake job interviews to attack companies in Europe, Asia, the Middle East, and Central America.…

Immagine del sitoCybercrime
KONNI Malware Targets Crypto Developers with AI-Powered Attacks
Redazione RHC - 22/01/2026

Check Point Research recently discovered a sophisticated phishing campaign orchestrated by KONNI , a threat group linked to North Korea . Historically focused on diplomatic targets in South Korea, the malicious actor has now expanded…

Immagine del sitoCybercrime
Fortinet FortiOS Vulnerability Exploited: CVE-2025-59718 Patch Bypass
Redazione RHC - 22/01/2026

Attackers are exploiting a previously patched critical FortiGate authentication flaw (CVE-2025-59718) through a patch bypass method to breach protected firewalls, as Fortinet customers are experiencing. Fortinet reportedly plans to soon release FortiOS versions 7.4.11, 7.6.6,…

Immagine del sitoCybercrime
Cisco Zero-Day Vulnerability CVE-2026-20045 Actively Exploited
Redazione RHC - 22/01/2026

A critical zero-day remote code execution (RCE) vulnerability, identified as CVE-2026-20045, has been discovered by Cisco and is being actively exploited in active attacks. Cisco has urged immediate patching, and its Product Security Incident Response…