Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Enterprise BusinessLog 320x200 1
Banner Desktop

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Neuralink’s Brain-Computer Implants to Revolutionize Human Life by 2026 Cybercrime

Neuralink’s Brain-Computer Implants to Revolutionize Human Life by 2026

Neuralink, Elon Musk's brain implant company, is preparing to realize what until recently seemed like science fiction. According to Musk,...
Redazione RHC - 3 January 2026
Zero-Day Exploits on the Rise: How to Protect Your Network Cybercrime

Zero-Day Exploits on the Rise: How to Protect Your Network

Until recently, zero-day vulnerabilities seemed like exotic artifacts from the world of special operations and espionage . Now they're a...
Redazione RHC - 2 January 2026
Long-Lived Technologies: COBOL, C, SQL, and Legacy Systems Culture

Long-Lived Technologies: COBOL, C, SQL, and Legacy Systems

While the industry debates which neural network is the “smartest” and which framework is the “most modern,” decades-old technologies continue...
Redazione RHC - 2 January 2026
PollyPolymer Revolutionizes Robotics with 3D Printed Flexible Components Cybercrime

PollyPolymer Revolutionizes Robotics with 3D Printed Flexible Components

When XPeng unveiled its new humanoid robot this year, the spectacle was designed to inspire disbelief. The robot's movements were...
Redazione RHC - 2 January 2026
GlassWorm Malware Targets macOS via Open VSX Extensions Cybercrime

GlassWorm Malware Targets macOS via Open VSX Extensions

A new wave of malicious extensions has been discovered in the Open VSX extension store, used by millions of developers....
Redazione RHC - 2 January 2026
AI Job Losses: Geoffrey Hinton Warns of Widespread Unemployment by 2026 Cybercrime

AI Job Losses: Geoffrey Hinton Warns of Widespread Unemployment by 2026

Computer science professor Geoffrey Hinton , one of the founders of modern artificial intelligence technologies, has claimed that AI could...
Redazione RHC - 2 January 2026

Massive Cloud Cyberespionage: PCPcat Hits 59,128 Servers in 48 Hours

A large-scale, highly automated cyberespionage campaign is systematically targeting the cloud infrastructure that supports numerous modern web applications. In less than 48 hours, tens of thousands of servers have been...
Share on Facebook Share on LinkedIn Share on X

Critical Net-SNMP Vulnerability Exposes Networks to RCE Attacks

A critical vulnerability has been discovered in the Net-SNMP software suite, widely used globally for network management and monitoring. The flaw, classified as CVE-2025-68615, has a CVSS score of 9.8,...
Share on Facebook Share on LinkedIn Share on X

A backdoor in NVIDIA code. Three 9.8 bugs plague AI and robotics development systems

When it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it...
Share on Facebook Share on LinkedIn Share on X

Australia Boosts Papua New Guinea’s Digital Infra with New Undersea Cable

A new undersea cable funded by Australia under a recent mutual defence agreement with Papua New Guinea is set to strengthen the island country's digital infrastructure and ensure continuity of...
Share on Facebook Share on LinkedIn Share on X

China Issues First Level 3 Autonomous Driving Licenses, Paving Way for Self-Driving Cars

On December 23, the Traffic Management Bureau of the Beijing Municipal Public Security Bureau officially issued the first batch of Level 3 autonomous driving license plates to three intelligent vehicles....
Share on Facebook Share on LinkedIn Share on X

Nvidia H200 Chip Shipments to China Set to Begin

Nvidia has informed its customers in China of its intention to begin shipping the first H200 chip, the company's second-most powerful AI accelerator, before New Year's Eve. The information was...
Share on Facebook Share on LinkedIn Share on X

La Poste Hit by Pro-Russian DDoS Attack During Peak Holiday Season

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective...
Share on Facebook Share on LinkedIn Share on X

Spotify Web Scraping: Anna’s Archive Scrapes 300TB of Music Library

Activists and hackers at Anna's Archive have reportedly combed nearly the entire music library of the largest streaming service, Spotify. They claim to have collected metadata for 256 million tracks...
Share on Facebook Share on LinkedIn Share on X

CVE-2025-47761: FortiClient VPN Zero-Day Exploit Lets Privilege Escalation

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies...
Share on Facebook Share on LinkedIn Share on X

Ukrainian Hacker Charged in Major Ransomware Attacks

A Ukrainian man implicated in a series of ransomware attacks has been found guilty in the United States. These cybercrimes affected companies in several countries, including the United States, Canada,...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Cloudflare vs Italy: The Battle for Internet Freedom and DNS Control
Redazione RHC - 14/01/2026

Cloudflare CEO Matthew Prince has threatened to shut down the company’s operations in Italy after the country’s telecom regulator fined it twice its annual revenue in the country. The facts The conflict erupted around Italy’s…

Immagine del sitoCybercrime
Cybercrime Meets Real-Life Violence: Foxtrot Network’s Dark Side
Redazione RHC - 13/01/2026

In recent months, there has been increasing talk of a paradigm shift in cybercrime . What for years was perceived as a predominantly digital ecosystem— consisting of fraud, identity theft, online extortion, and cyberattacks —is…

Immagine del sitoCybercrime
Iran Cyber Crisis: Connettività Compromised
Roberto Villani - 13/01/2026

Sometimes important things don’t arrive at a press conference. They arrive like a graph that stops breathing: the connectivity line collapses, the OSINT dries up, the noise grows as the signal disappears. In Iran, the…

Vulnerability
ServiceNow AI Vulnerability CVE-2025-12420: Critical Security Risk
Redazione RHC - 13/01/2026

A critical flaw has been identified in ServiceNow’s artificial intelligence platform, with a severity score of 9.3 out of 10. This vulnerability, classified as CVE-2025-12420, could allow attackers to impersonate legitimate users without authenticating. ServiceNow…

Immagine del sitoCybercrime
CRISPR-Cas13: Breakthrough in Flu Treatment with Gene Editing
Redazione RHC - 12/01/2026

Influenza remains one of the most stubborn and unpleasant infections on the planet. It returns every winter, mutating, evading the immune system, and eventually becoming drug-resistant. Now, scientists are proposing an unexpected approach that could…