Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
970x120 Enterprise 1

Red Hot Cyber – News and insights on cybercrime and cybersecurity

Precedente Successivo

Ultime news

Google Fast Pair Vulnerability: WhisperPair Exposes Millions of Devices Cyber News

Google Fast Pair Vulnerability: WhisperPair Exposes Millions of Devices

Researchers from the Cybersecurity and Industrial Cryptography team at KU Leuven have discovered a critical flaw in the Google Fast...
Agostino Pellegrino - 19 January 2026
Elon Musk Sues OpenAI for $134 Billion Over AI Betrayal Cyber News

Elon Musk Sues OpenAI for $134 Billion Over AI Betrayal

Elon Musk has filed a staggering $134 billion in damages in a malicious lawsuit against OpenAI and Microsoft. According to...
Redazione RHC - 19 January 2026
Net-NTLMv1 Exploitation: Rainbow Tables for Modern Attacks Cyber News

Net-NTLMv1 Exploitation: Rainbow Tables for Modern Attacks

Mandiant has released a large set of rainbow tables dedicated to Net-NTLMv1 with the aim of concretely demonstrating how insecure...
Redazione RHC - 18 January 2026
Critical Vulnerability in Modular DS WordPress Plugin – Update Now Cyber News

Critical Vulnerability in Modular DS WordPress Plugin – Update Now

A high-severity security vulnerability has been identified in the WordPress plugin "Modular DS (Modular Connector)," and numerous security reports suggest...
Manuel Roccon - 18 January 2026
Your paycheck is zero! Congratulations, someone answered the phone wrong Cyber News

Your paycheck is zero! Congratulations, someone answered the phone wrong

No worker would accept their paycheck disappearing without explanation. It was precisely from a series of internal reports of this...
Redazione RHC - 18 January 2026
Two Ukrainians Suspected in Black Basta Ransomware Attacks Cybercrime

Two Ukrainians Suspected in Black Basta Ransomware Attacks

When it comes to cybersecurity, it's not uncommon to come across news stories that seem straight out of a science...
Pietro Melillo - 17 January 2026

The Future of Tech: Sovereignty, Security, and Cloud Control

In today's world, technology is no longer a mere tool for efficiency or convenience, but a primary geopolitical lever . Access to digital infrastructure, cloud platforms, and communications systems isn't...

Internet Shutdowns Cost $19.7B in 2025, Sophisticated Censorship Rises

Imagine a situation where the internet appears to be working, but websites won't open beyond the first screen, messaging apps are intermittent, and businesses are constantly changing. According to the...

Doom on a Smart Pressure Cooker: The Ultimate IoT Hack

The line between home appliances and gaming consoles continues to blur. The latest frontier of " extreme porting" features the Krups Cook4Me Connect , a smart pressure cooker that's been...

LockBit 5.0 Ransomware: The Evolving Threat

Cybercrime continues to reinvent itself, and LockBit is one of the most prominent examples. Active since late 2019, the group has become one of the most prolific ransomware operators ever...

Instagram Data Leak Exposes 17.5 Million Users on Dark Web

A massive digital archive containing the private information of approximately 17.5 million Instagram users appears to have fallen into the hands of cybercriminals. A few hours ago, the alarm was...

Phishing Emails Mimic Internal Comms via Microsoft 365 Spoofing

Phishing attacks are becoming increasingly insidious, to the point of perfectly mimicking internal corporate communications . This is the alarm raised by Microsoft, which has observed a significant increase in...

Lovense Emily AI Doll: Revolutionary Companion at CES 2026

At CES 2026 in Las Vegas, Lovense , known for its app-controlled smart toys for adults , decided to make a bold statement in a completely different format . Instead...

HPE OneView Critical Vulnerability Exploited: Update Now to Prevent Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) of the United States of America has raised the alarm about the active exploitation of a critical vulnerability in HPE OneView , an...

Undertow Vulnerability CVE-2025-12543 Exposes Java Ecosystem to Critical Security Risks

A flaw has been discovered in the foundation of the Java web ecosystem. Undertow , the high-performance web server that powers enterprise heavyweights like WildFly and JBoss EAP , has...

The Revolutionary iPhone Launch: A Game-Changing Moment in Tech History

San Francisco: January 9, 2007 There was something strange about the air, like when you know something's about to happen but you don't know what. Steve Jobs was on stage...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Beware of “I am not a robot”: the malware trap that uses Google Calendar.
Bajram Zeqiri - 29/01/2026

A new threat is lurking, exploiting our greatest weakness: habit. How many times, in fact, do you find yourself clicking on verification boxes without thinking twice? Now, it seems that malicious people have created a…

Immagine del sitoCybercrime
A blow to the heart of cybercrime: RAMP taken offline. The “temple” of ransomware falls!
Bajram Zeqiri - 28/01/2026

The RAMP (Russian Anonymous Marketplace) forum, one of the main hubs of the international cybercrime underground, has been officially shut down and seized by US law enforcement . The news emerged after the domain associated…

Immagine del sitoCyberpolitics
Digital Autonomy: France Says Goodbye to Teams and Zoom by 2027
Silvia Felici - 28/01/2026

This isn’t the first initiative to emerge on this front recently. Indeed, we’ve heard several of them, one after the other. And it’s almost inevitable: technological autonomy and national security are becoming an increasingly popular…

Immagine del sitoCyber News
And let the phishing begin! Microsoft is taking action against a zero-day exploit already exploited in Office
Pietro Melillo - 27/01/2026

Once again, Microsoft was forced to quickly fix some flaws. The company has released unscheduled patches for Microsoft Office, addressing a dangerous zero-day vulnerability that has already been exploited in cyberattacks. The issue, identified as…

Immagine del sitoCyber News
ServiceNow Under Attack: How an Email Can Open the Doors to Your Business
Redazione RHC - 27/01/2026

The recent discovery of a vulnerability in ServiceNow’s AI platform has shaken the cybersecurity industry. This flaw, characterized by an extremely high severity score, allowed unauthenticated attackers to impersonate any corporate user. To launch the…