Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Cyber Offensive Fundamentals 970x120 V0.1
Precedente Successivo

Latest news

Cybersecurity in Local Administrations: The Hidden Risk Cybercrime

Cybersecurity in Local Administrations: The Hidden Risk

There's a convenient misconception in Italy: thinking that cybersecurity is a matter for ministries or large strategic players. It's reassuring....
Roberto Villani - January 22, 2026
UK Organizations Hit by Russia-Backed DDoS Attacks Cyber News

UK Organizations Hit by Russia-Backed DDoS Attacks

The UK's National Cyber Security Centre has issued a strong warning regarding a series of denial-of-service (DDoS) attacks targeting British...
Redazione RHC - January 22, 2026
GitLab Security Update Fixes Critical Vulnerabilities CVE-2026-0723 Cyber News

GitLab Security Update Fixes Critical Vulnerabilities CVE-2026-0723

An urgent security update has been released by GitLab for the Community (CE) and Enterprise (EE) editions to address several...
Massimiliano Brolli - January 21, 2026
Critical Telnetd Vulnerability in GNU InetUtils Allows Root Access Cyber News

Critical Telnetd Vulnerability in GNU InetUtils Allows Root Access

A critical security flaw has been discovered in the telnetd server component of GNU InetUtils, involving remote authentication bypass ....
Agostino Pellegrino - January 21, 2026
Everest Ransomware Attacks McDonald’s, 861GB Data Stolen Cyber News

Everest Ransomware Attacks McDonald’s, 861GB Data Stolen

Yesterday, the Everest cybercriminal gang claimed responsibility for a cyberattack on McDonald's on their Data Leak Site (DLS) . From...
Redazione RHC - January 21, 2026
ESXi Zero-Day Exploit: How to Protect Your VMware Environment Cyber News

ESXi Zero-Day Exploit: How to Protect Your VMware Environment

A group of attackers is using a zero-day exploit toolkit to compromise VMware ESXi instances in an uncontrolled manner, taking...
Silvia Felici - January 20, 2026

Supply Chain Security: Protect Your Business from Cyber Threats

In an increasingly interconnected digital ecosystem, companies depend on networks of suppliers and partners to operate efficiently. However, this interdependence has transformed the supply chain into a new critical cybersecurity...

CVE-2026-21858: n8n Vulnerability Exposes Thousands of Servers to RCE

The vulnerability, identified as CVE-2026-21858, which we recently reported on, affects approximately 100,000 servers worldwide, threatening to expose proprietary API keys, customer databases, and AI workflows. The vulnerability, with a...

Malware PHALT#BLYX Uses Social Engineering and MSBuild to Infect Systems

A cancellation message from Booking.com with a high penalty seems like a typical business practice for hotels and apartments. But it's precisely this type of email that triggered a new...

DevSecOps: Integrating Security into Your Development Process

When it comes to application security, there's rarely a single problem. It's almost always a chain of small flaws, poor decisions, and missing controls that, when added together, pave the...

Critical RCE Vulnerability in D-Link DSL Routers – Update Now

A critical remote code execution (RCE) flaw in older D-Link DSL routers has been identified as CVE-2026-0625, with a CVSS v4.0 score of 9.3, indicating a high risk for users...

LED Data Transmission System for Smart Traffic

Researchers at Tokyo Polytechnic University have presented a simple and cost-effective wireless data transmission system using LEDs. The project boasts stable outdoor operation, even in bright sunlight, and could form...

Microsoft’s AI Future: Models to Systems with Satya Nadella

With 2026 just around the corner, Microsoft CEO Satya Nadella shared a thoughtful reflection on the state of the AI industry on SN Scratchpad , his new personal blog. In...

Patchwork Group Unleashes StreamSpy Malware with WebSocket C2 Channel

The Patchwork hacker group, also known as Dropping Elephant and Maha Grass , has returned to the spotlight after a series of targeted attacks on Pakistani defense facilities. In their...

China Achieves Quantum Error Correction Breakthrough with Microchip

For years, quantum computers have seemed like a futuristic technology: on paper, they can solve problems that classical machines can’t handle in a reasonable time, but in reality they constantly...

Critical GNU Wget2 Vulnerability Exposes Users to File Overwrite Attacks

A serious vulnerability has been discovered in the popular GNU command-line downloader Wget2 , which allows attackers to overwrite files on the victim's computer without their knowledge or consent. The...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE